TW521189B - System and method for implementing a separate virtual channel for posted requests in a multiprocessor computer system - Google Patents

System and method for implementing a separate virtual channel for posted requests in a multiprocessor computer system Download PDF

Info

Publication number
TW521189B
TW521189B TW90120192A TW90120192A TW521189B TW 521189 B TW521189 B TW 521189B TW 90120192 A TW90120192 A TW 90120192A TW 90120192 A TW90120192 A TW 90120192A TW 521189 B TW521189 B TW 521189B
Authority
TW
Taiwan
Prior art keywords
packet
node
virtual channel
command
post
Prior art date
Application number
TW90120192A
Other languages
Chinese (zh)
Inventor
Jonathan M Owen
Mark D Hummel
James B Keller
Original Assignee
Advanced Micro Devices Inc
Api Networks Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US09/640,602 external-priority patent/US6950438B1/en
Application filed by Advanced Micro Devices Inc, Api Networks Inc filed Critical Advanced Micro Devices Inc
Application granted granted Critical
Publication of TW521189B publication Critical patent/TW521189B/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F13/14Handling requests for interconnection or transfer
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F13/38Information transfer, e.g. on bus
    • G06F13/42Bus transfer protocol, e.g. handshake; Synchronisation
    • G06F13/4265Bus transfer protocol, e.g. handshake; Synchronisation on a point to point bus

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Memory System Of A Hierarchy Structure (AREA)
  • Multi Processors (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A computer system employs virtual channels and allocates different resources to the virtual channels. More particularly, the computer system provides a posted commands virtual channel separate from the non-posted commands virtual channel for routing posted and non-posted commands or requests through coherent and noncoherent fabrics within the computer system. Because separate resources are allocated to the virtual channels in the computer system, posted requests may be allowed to become unordered with other requests from the same source. Implementation of a separate posted commands virtual channel may allow the computer system to maintain compatibility with I/O systems in which posted write requests may become unordered with previous posted requests (e.g., the peripheral component interconnect bus, or PCI). Implementation of the separate posted commands virtual channel thus may assist in providing deadlock-free operation.

Description

521189 A7521189 A7

[發明領域] 本發明係關於電❹統領域且,更具體地,係關於多 處理器電腦系統中節點間資料之路由。 [發明背景] 大體而言,個人電腦(PCs)與其他種類電腦系統設計為 圍繞-個共享匯流排系統以存取記憶體。—個或多個處理 器及一個或多個輸入/輸出(1/0)裝置經由共享匯流排連接 至記憶體。I/O裝置可經由一個管理共享匯流排與ι/〇裝置 間資訊轉移之I/O橋樑連接至共享匯流排,而處理器典型 地直接連接至共享匯流排或經由一個快速緩衝儲存區體系 連接至共享匯流排。 遺憾地,共享匯流排系統具數個缺點。例如,連接至 共享匯流排之數個裝置引起相當大之電容至匯流排上之裝 =驅動信號。此外,共享匯流排上數個接點於高信號頻率 時產生信號反射,減少信號完整性。結果,匯流排上之信 號頻率通常保持相當低以維持信號完整性於可接受程度。 此相當低之信號頻率減少信號頻寬,限制連接至匯流排之 裝置性能。 缺少對較多數目裝置容量之可量測性為共享匯流排 系統之另一不利條件。一個共享匯流排之可使用頻寬大體 上固定(且可能減少,若增加額外裝置使得匯流排上信號頻 率減少)。一旦連接至匯流排之裝置頻寬要求(直接或間接) 超越匯流排可使用頻寬,當試圖存取匯流排時,裝置將經 _ f拖延,且包含共享匯流排之電腦系統整體性能將很可能 麵準議職格(21G x 297^} , 咖[Field of the Invention] The present invention relates to the field of electrical systems and, more specifically, to the routing of data between nodes in a multiprocessor computer system. [Background of the Invention] In general, personal computers (PCs) and other types of computer systems are designed to share a bus system around to access memory. One or more processors and one or more input / output (1/0) devices are connected to the memory via a shared bus. I / O devices can be connected to the shared bus via an I / O bridge that manages the transfer of information between shared buses and ι / 〇 devices, while processors are typically connected directly to the shared bus or via a fast buffer storage system To shared bus. Unfortunately, shared bus systems have several disadvantages. For example, several devices connected to a shared bus cause considerable capacitance to the device on the bus = the drive signal. In addition, several contacts on the shared bus produce signal reflections at high signal frequencies, reducing signal integrity. As a result, the frequency of the signal on the bus is usually kept quite low to maintain the signal integrity to an acceptable level. This relatively low signal frequency reduces the signal bandwidth and limits the performance of devices connected to the bus. The lack of scalability to a larger number of device capacities is another disadvantage of a shared bus system. The usable bandwidth of a shared bus is generally fixed (and may be reduced, if additional devices are added to reduce the signal frequency on the bus). Once the bandwidth requirement of the device connected to the bus (directly or indirectly) exceeds the available bandwidth of the bus, when trying to access the bus, the device will be delayed by _f, and the overall performance of the computer system including the shared bus will be very Possibility of negotiation (21G x 297 ^), coffee

Awl 1---------Awl. (請先閱讀背面之注意事項再填寫本頁) 521189 B7 五、發明說明(2 降低。 株另/面’分散式記憶體系統不具上述之許多不利侔 1 牛中二個具分散式記憶體系統之電腦系統包含數個節點 ==多個連接至不同記憶體。節點使用任二 接彼此相連。例如,备 < 田逆 每個節點可、車故 p "、可使用專線彼此連接。或者, 二定數目之其他節點,且各執行可經由 欣:夕 間即點,路由第一節點至一個未直接與第一 :點:之第二節點。電腦系統之 : 及每個節點之記憶體。 二間刀派遍 一般而言,一個”節點"為—個能於連接上 之裝置。例如’連接可為封包基礎, ^订 訂 與傳送作為執行一部份 了叹疋為接收 連串封包。-個”請求: 請求封包’起始一個指向”目標々點之:點藉:發佈-個 份之每個封包,於”订二執行-部 個別封包之,,終點”。當_::1 ㈣二接收節點 節點接受由封包傳達之資3取、、氐達目標卽點’目標 個位於來源與目=f:於内部處理資訊。或者,-請求者節點至目途徑上之節點可轉達封包由 除最初請求封肖外> 、 備,你丨如父 行可導致其他種類封包之務 伟,例如答覆、探查、與廣播,其每 ί匕之發 :如,於接收最初請求封包後,目標 :二::。 =至處理系統裡其他節點。這些節點布廣= 上向目標郎點或請求者節點之答覆。奸“4 了產生 。標節點’目 z 91S90 五、發明說明(3 ) 標節點可藉由發佈—個答 分散式記憶體系統呈現出與二者:點加以答覆。 不同設計挑戰。例如丑> /、旱匯々iL排系統挑戰之 節執行之起始。因此:二子/匯流排系統經由匯流排仲裁調 流排參與者具起始執行之仲裁演算規則允許每個匯 執行履行之順序。匯流排上之執行順序表示 散式系統’節點可同時起 / )、另-方面’於分 其他節點。$此#/ σ仃且使用連接以傳送執行至 :點k些執行因無提供調節 而可能具邏輯衝突於1 之機制, 貫衝幻且可能遭遇牽涉相同位址之執行之連 Μ 处遇貝源衝突(例如緩衡儲存器空間可能盔 傳播因此’確保資訊繼續於節點間流暢地 成m㈣料行以衝突,於其+無執行完 經濟部智慧財產局員工消費合作社印製 例如’某些僵局情況可能發生於已知t I/O系統,例 如周邊零件連接界面(PCI)I/0系統,除非與一個,,後,,寫 入執行相關之封包允許超越其他未與後寫入執行相關之其 他訊務。一般而言,當寫入請求與對應資料由請求者傳送 (例如,經由一個來源界面),一個後寫入執行視為由請求 者完成’且以此,有效地於請求者完成。因請求者並非直 接察覺何時後寫入執行實際地由目標完成,更多關於後請 求操作之順序支援需於硬體提供。因此,當封包或後寫入 執行之封包行進至目標時,請求者可發佈額外請求,並假 定此類額外請求將於起始後執行完成後完成。需具足夠可 使用硬體以支持此假定。 本紙張尺度適用中國國家標準(CNS)A4規格(210 x 297公釐) 3 91890 B7 經濟部智慧財產局員工消費合作社印製 五、發明說明(4 相對地,一個”非後”寫一、、 成,直到目標(例如,一個 仃不視為已由請求者完 當非後寫人執行完成士 ""界面)已完成非後寫入執行。 發佈非後寫入執行,例如,…:求者接收及說明。可 隨後執行發佈前完成。 田月,而知道先前執行已於 I/O:::分散式記憶體系統之電腦系統中,產生自 操作恰當地安排,以維護電腦系統裡之記 隱體連貫及符合1/0系統之 操作可能需以其產生之順序1要求°例如’記憶體 # # H β Μ 貭序凡成,以維護電腦系統裡之記 ^體^貫及付合1/0順序要求。因此—個電腦系統 方仃套系統與方法以提供後請求—個分離通訊通道。此 類系,與方法可避免僵局情況,且亦使裝置(就硬體而言) 縮至最小以提高施行之容易性。 [發明概要] 本發明提供一種電腦系統,此電腦系統施行一種使用 虛擬通道及分配不同資源至虛擬通道之系統與方法。更具 體地’本電腦系統提供一個與非後命令虚擬通道分離之後 命令虛擬通道,以路由請求通過電腦系統裡之協調與非協 調結構。後寫入屬於後命令虚擬通道,且其他請求屬於非 後命令虛擬通道。因電腦系統裡之個別資源提供至虛擬通 道’後寫入可允許與由相同來源來之其他請求變為無順 序。有利地,電腦系統可與要求關於先前非後請求之後寫 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐)Awl 1 --------- Awl. (Please read the precautions on the back before filling out this page) 521189 B7 V. Description of the invention (2 reduced. Strain / side 'distributed memory system does not have many of the above Disadvantages1 Two computer systems with a decentralized memory system in cattle include several nodes == multiple connected to different memories. Nodes are connected to each other using any two connections. For example, each node of Tian Ni can be, The car can be connected to each other using a dedicated line. Or, a predetermined number of other nodes can be implemented, and each execution can be routed through Xin: Evening, and the first node is routed to a second that is not directly connected to the first: Point: Nodes. Computer systems: and the memory of each node. The two schools are generally distributed. A "node" is a device that can be connected. For example, 'connection can be the basis of a packet. Sending as part of the implementation is sighed to receive a series of packets.-A "request: request packet 'start one point to the target' point: point borrow: publish-each packet of a copy, execute on" order two " -The individual packets, the end. "When _ :: 1 ㈣ 二The receiving node accepts the information transmitted by the packet. The destination is located at the source and destination = f: internally processes the information. Or, the node on the requester-to-destination route can forward the packet and remove it. Initially requesting the outside of the envelope> If you are a parent, you can lead to other types of packets, such as replying, probing, and broadcasting. For example, after receiving the original requested packet, the target: 2 :: = = to other nodes in the processing system. These nodes are widely distributed = reply to the target destination or the requester node. The "4" was generated. The target node 'header 91S90 V. Description of the invention (3) Target node This can be achieved by publishing a distributed memory system that responds to both: points to answer. Different design challenges. For example, Ugly > /, the beginning of the implementation of the challenge section of the iL row system. Therefore: Erzi / The bus system arbitrates the bus participants through the arbitration rules of the bus participants 'initial execution to allow each sink to perform the order of execution. The execution order on the bus indicates that the distributed system' nodes can start at the same time /), the other side 'Points to other nodes. $ 此 # / σ 仃 and use the connection to send the execution to: some execution mechanisms that may have a logical conflict of 1 due to the lack of adjustments, which will run through and may encounter executions involving the same address. Source conflicts (such as slow balance storage space may spread helmets, so 'ensure that information continues to flow smoothly between nodes and conflicts, and its implementation has not been completed, such as' some deadlock' The situation may occur in a known t I / O system, such as a peripheral part connection interface (PCI) I / 0 system. Unless one, and later, write execution-related packets are allowed to surpass others that are not related to post-write execution Other services. In general, when a write request and corresponding data are transmitted by the requester (for example, via a source interface), a post-write execution is considered to be completed by the requester 'and thus, it is effectively completed by the requester Because the requester does not directly detect when the post-write execution is actually completed by the target, more order support for the post-request operation needs to be provided by the hardware. Therefore, when the packet or post-write execution As the packet travels to the target, the requester may issue additional requests and assume that such additional requests will be completed after execution is completed. Sufficient usable hardware is required to support this assumption. This paper size applies Chinese national standards ( CNS) A4 specification (210 x 297 mm) 3 91890 B7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs V. Invention description (4 In contrast, a "non-post" writes one and one, until the goal (for example, one仃 It is not considered that the requester has completed the non-post-writer execution completion (quote) interface) The non-post-write execution has been completed. The non-post-write execution is issued, for example, ...: the requester receives and explains. Can be subsequently Completed before the implementation of the release. Tian Yue, knowing that the previous implementation has been generated in the computer system of the I / O ::: distributed memory system, and the operation is properly arranged to maintain the consistency and conformity of the memory in the computer system. The operation of the / 0 system may require 1 in the order in which it was generated. For example, 'Memory # # H β Μ 貭 Order Fancheng, in order to maintain the records in the computer system and meet the 1/0 order requirements. Therefore — A computer The system formulates systems and methods to provide post-request—a separate communication channel. Such systems and methods can avoid deadlock situations and also minimize the device (in terms of hardware) to improve the ease of implementation. Summary of the Invention] The present invention provides a computer system that implements a system and method for using virtual channels and allocating different resources to virtual channels. More specifically, the computer system provides a command virtual channel after separation from non-post-command virtual channels. To route requests through the coordination and non-coordination structure in the computer system. Post-write belongs to the post-command virtual channel, and other requests belong to the non-post-command virtual channel. Because individual resources in the computer system are provided to the virtual channel, the post-write can be Allows requests to be made out of order with other requests from the same source. Advantageously, the computer system can be written with the requirements of the previous non-post request. The paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm).

imr 裝 訂---------AWI · (請先閱讀背面之注意事項再填寫本頁) 4 91890 經濟部智慧財產局員工消費合作社印制衣 91890 521189 A7 ^~—--2Z____ 五、發明說明(5 ) ' -- 入變為無順序(例如,周邊零件連接界面,或pci)之先前 I/O系統維持兼容性,因而避免某些否則可能產生於卯 系統之僵局。有利地’冑由提供—個後命令虛擬通道,電 腦系統可提供所要求之兼容性與提供錢局操作。 廣泛而t ’本發明乃考慮電㈣系統裡複數個節點間路 $封包之方法。一個後請求封包於複數個節點中之第一個 節點被接收。第一節點包含複數個封包緩衝儲存器,其中 每一個之缓衝儲存器分派至複數個虛擬通道中不同之一 個。後請求封包儲存於後命令緩衝儲存器中,其為複數個 封包緩衝儲存器中之-個。後命令緩衝儲存器專用於後命 令虛擬通道中之封包,其為複數個虛擬通道中之一個。 此外,本發明乃考慮一種包含第一節點與第二節點之 電腦系統。第一節點設定為傳送一個後請求封包。連接以 接收由第一節點來之後請求封包,第二節點包含複數個封 包緩衝儲存器,此封包緩衝器包含後命令緩衝儲存器。複 數個封包緩衝儲存器之每一個分派至複數個虛擬通道中不 同之一個,此虚擬通道包含後命令緩衝儲存器指定之後命 令虛擬通道。第二節點設定為儲存後請求封包於後命令緩 衝儲存器裡。 [圖式之簡單說明] 於閱讀下列詳細說明並參照伴隨圖式將可瞭解本發 明之其他目的及優點,其中: 第1圖為包含複數個處理節點之電腦處理系統之示範 具體實施例之區塊圖; 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐] —--- 5 -----------jmp 裝--------訂--------- (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 91890 521189 五、發明說明(6 ) 第2圖為第1圖之兩個虛 1U慝理_點區塊圖,顯示連接節 點之通訊連接之示範具體實施例·, 第3圖為可使用於處理次系 々 也人糸统内之不範協調資訊封包 之圖示; 第4圖為可使用於處理+^ & ^ 处里-人系统内之示範協調請求封包 之圖不, 第5圖為可使用於處理次系、统内之示範協調答覆封包 之圖不, 第6圖為可使用於處理次系統内之示範協調資料封包 之圖示; 第7圖為表格,列出可使用於處理次系統内之不同種 類協調封包; 第8圖為區塊圖,說明處理系統裡一對虛擬通道; 第9圖為表格,說明一組虛擬通道及其可應用連接之 示範具體實施例; 第10圖為第1圖處理節點之示範具體實施例區塊 圖,節點包含封包處理邏輯; 第11圖為第10圖節點之封包處理邏輯之示範具體實 施例區塊圖,封包處理邏輯包含資料緩衝儲存器槽與答覆 計數器槽; ~ Θ 第12圖為位於第11圖資料緩衝儲存器槽裡位置之一 個示範具體實施例區塊圖; 第13圖為位於第11圖之答覆計數器槽裡位置之示範 具體實施例區塊圖; 本》氏張尺度適用中國國家標準(CNS)XTiT格(210 X 297公爱) -----------Imp t--------^---------Awl (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 521189 五、發明說明(7 ) 弟14圖為第1〇圖用 垃 口用以接收封包之部分 之示範具體實施例操作之流程圖; 輯 第15圖為第1〇圖用以處 、_ 处里δ月求封包之部分封句虛王¥ 邏輯之示範具體實施例操作之流程圖; 第10圖為第10圖用以處 ^ 一 处埋答覆封包之部分封包處理 邏輯之示範具體實施例操作之流程圖; 第17圖為第10圖用以如仏 _ 用以起始封包之部分封包處理邏輯 之示範具體實施例操作之流程圖; 第18圖為區塊圖’顯示包含緩衝儲存器釋放領域之 Ufo封包之示範具體實施例; 弟19圖為I/O次系統之示範且 祀/、篮貫施例區塊圖,此 I/O次系統包含主要橋樑與複數個經由聯繫連接之μ 點’其與第1及2圖顯示之連接相似; 第20圖為表格,說明用於非協調連接之封包定義 示範具體實施例; ( 第21圖為可使用於處理系統之示範非協調請求 之圖示; ^ 第22圖為可使用於處理系統之示範非協調答覆封勺 之圖示; 、匕 第23圖為第19圖之I/O次系統之1/〇節 f *始 < 不魏具 體實施例區塊圖; ^ 第24圖為第23圖用於封包接收之節點邏經 〜干斗 < 不執部 分之操作流程圖; 弟25圖為第24圖用以處理请求封包之節點邏輯之 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公爱了 ^ — / 91890 冒<v 裝--------訂---------^^1 (請先閱讀背面之注意事項再填寫本頁) 521189 經濟部智慧財產局員工消費合作社印製 A7 -------—B7_______ 五、發明說明(8 ) 範部分之操作流程圖; 第26圖為第24圖用以處理答覆封包之節點邏輯之示 範部分之操作流程圖; 第27圖為第24圖用以起始封包之節點邏輯之示範部 分之操作流程圖;以及 第28圖為表格,列出可由第19圖主要橋樑施行之示 範順序規則。 雖然本發明容許不同修改與替代形式,其特定具體實 施例經由圖示之範例顯示,且將於此詳細敘述。需瞭解的 是’然而,所附之圖式與詳細說明並非意圖限制本發明於 揭示之特定形式,而相反地,目的在於涵蓋所有落於由所 附申請專利範圍所定義之本發明精神與範疇裡之修改,相 等物與選擇。 [發明之詳細說明] 系統綜述 參照第1圖’顯示電腦系統1 〇之具體實施例。電腦 系統10之其他具體實施例為可能並予以考慮。於第1圖之 具體實施例,電腦系統10包含數個處理節點12A、1 2B、 12C、與12D,雖然可使用更多或更少處理節點。每個處 理節點經由包含於每個個別處理節點丨2 a至12D裡之記憶 體控制器16A至16D,連接至個別記憶體14A至14D。電 腦系統10之記憶體位址空間分派遍及記憶體14A至1 4D, 使得系統1 〇具分散式記憶體系統。此外,處理節點12 A 至12D包含用於處理節點12A至12D間通訊之界面邏輯。 . 11 — — — — — — · I------訂·-------- f請先閱讀背面之注意事項再填寫本頁} 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公餐) 8 91890 521189 A7 B7 五、發明說明(9 ) 例如,處理節點12A包含界面邏輯18八以與處理節點12b 通訊,界面邏輯18B與處理節點12c通訊,及第三界面邏 輯18C與另一處理節點通訊(未顯示)。相似地,處理節點 12B包含界面邏輯18D'刚、與Ι8ρ;處理節點以包 各界面邏輯18G、18H、與181 ;及處理節點12D包含界面 邏輯18J、18K、與18L。處理節點12D經由界面邏輯i8]L, 連接至與I/O橋樑20通訊。其他處理節點可以相似方式與 其他1/0橋樑通訊。1/0橋樑20連接至I/O匯流排22。 頁 消 、處理節點12A至12D施行封包基礎雙向連接24以作 為處理節點間之通訊。於本具體實施例,雙向連接以一組 單向=路(例如線路24A用以由處理節點12A傳送封包至 處理節點12B ’且線路24B用以由處理節點12β傳送封包 至處理節點12A)施行。其他組線路24c至24H用以於如 第2圖所說明之其他處理節點間傳送封包。連接可以快速 緩衝儲存區協調方式操作,作為處理節點間通訊(,,協調連 接Ί或以非協調方式作為處理節點與1/〇冑樑(”非協調連 接)間通成。此外,非協調連接可於1/〇裝置間以連接鏈 連接結構施行,以取代1/0匯流排22。經由協調連接之兩 個或多個節點之連接稱之為,,協調結構,,。相似地,經由非 ,調連接之兩個或多個節點之連接稱之為”非協調連接”。 需注意的是,欲由處理節點傳送至另一個之封包可通過一 個=多個中間節點。例如,一個由處理節點Μ傳送至處 P點12D之封包可通過處理節點或處理節點I〕。, •如第1圖所^任何適當之路由演算規則皆可使用。 ^張尺度適織格(210 7 9 91890 521189 A7 B7 五、發明說明(10 ) 記憶體14A至14D可包含任何適當記憶體裝置。例 如,記憶體14A至14D可包含一個或多個RAMBUS動態 隨機存取記憶體(RDRAMs)、同步動態隨機存取記憶體 (SDRAMs)、靜態隨機存取記憶體等。如上述,電腦系統 1〇之位址空間指定遍及記憶體14A至14D。每個處理節點 12A至12D可包含一個記憶體映圖,用以判定那個位址映 圖至那個記憶體14A至14D,且因此對於一個特定位址之 記憶體請求需安排於處理節點12A至12D之那一個,需作 路由。於一個具體實施例,電腦系統1〇裡關於位址之連貫 點為連接至對應於該位址之記憶體儲存位元組之特定記憶 體控制器16A至16D。換言之,記憶體控制器16A至16D 負責確保每個至對應記憶體14A至14D之記憶體存取以一 個快速緩衝儲存區協調方式產生。記憶體控制器丨6 A至 16D可包含控制電路以作為至記憶體14人至ud之界面。 此外,記憶體控制器16A至16D可包含請求序列以排列記 憶體請求。 大體而言,邏輯界面18A至18L可包含緩衝儲存器以 接收由雙向連接來之封包與緩衝欲於連接上傳送之封包。 電腦系統Π)可使❹何適#流量控制機構以傳送封包。例 二:每個節點裡之界面邏輯可儲存一些每個種類緩衝儲 子…通訊連接另一末端之接收節點之界面邏輯裡。一個 ^節點不傳送封包直到接收節點具作為儲㈣包之 = 之閒置緩衝儲存器。當每個緩衝錯存器於接收節點内 個儲存封包),接收節點傳送" 本纸張尺度適用… 10imr binding --------- AWI · (Please read the notes on the back before filling in this page) 4 91890 Printed clothing by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 91890 521189 A7 ^ ~ —-2Z ____ V. Description of the Invention (5) '-The previous I / O system that has become non-sequential (for example, peripheral component connection interface, or PCI) maintains compatibility, thus avoiding some deadlock that might otherwise occur in the system. Advantageously, by providing a post-command virtual channel, the computer system can provide the required compatibility and provide money operation. The broad and t ′ present invention considers a method of enveloping a plurality of nodes between packets in an electrical system. A post-request packet is received at the first of a plurality of nodes. The first node includes a plurality of packet buffer memories, and each of the buffer memories is assigned to a different one of the plurality of virtual channels. The post-request packet is stored in the post-command buffer memory, which is one of a plurality of packet buffer memories. The post-command buffer memory is dedicated to packets in the post-command virtual channel, which is one of a plurality of virtual channels. In addition, the present invention considers a computer system including a first node and a second node. The first node is set to transmit a post-request packet. Connect to receive a request packet from the first node, the second node contains a plurality of packet buffer memory, this packet buffer contains a post command buffer memory. Each of the plurality of packet buffer memories is assigned to a different one of the plurality of virtual channels, and this virtual channel includes a command virtual channel specified by a command buffer buffer after the command. The second node is set to request a packet after storage in the post-command buffer memory. [Brief description of the drawings] Other objects and advantages of the present invention will be understood after reading the following detailed description and referring to the accompanying drawings. Among them: Fig. 1 is an exemplary embodiment of a computer processing system including a plurality of processing nodes. Block diagram; This paper size applies to China National Standard (CNS) A4 specification (210 X 297 mm) —--- 5 ----------- jmp installed -------- order- -------- (Please read the notes on the back before filling out this page) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 91890 521189 V. Description of the invention (6) Figure 2 is the two of Figure 1. Virtual 1U management_point block diagram showing exemplary specific embodiments of communication connections of connected nodes. Figure 3 is a diagram that can be used to deal with irregular coordinated information packets within the system and the system; Fig. 4 is a diagram that can be used to process a demonstration coordination request packet in the + ^ & ^ where-person system. Fig. 5 is a diagram that can be used to process a demonstration coordinated response packet in a sub-system. Figure 6 is a diagram that can be used to process a sample coordination data packet in the sub-system; Figure 7 is a table listing the Used to process different types of coordinated packets in the sub-system; Figure 8 is a block diagram illustrating a pair of virtual channels in the processing system; Figure 9 is a table illustrating a set of exemplary embodiments of virtual channels and their applicable connections Figure 10 is a block diagram of an exemplary embodiment of the processing node of Figure 1, the node contains the packet processing logic; Figure 11 is a block diagram of an exemplary embodiment of the packet processing logic of the node of Figure 10, the packet processing logic contains Data buffer storage slot and reply counter slot; ~ Θ Figure 12 is a block diagram of an exemplary embodiment located in the data buffer storage slot of Figure 11; Figure 13 is located in the reply counter slot of Figure 11 A block diagram of an exemplary embodiment of the location; The scale of this book applies to the Chinese National Standard (CNS) XTiT grid (210 X 297 public love) ----------- Imp t ------ -^ --------- Awl (Please read the notes on the back before filling out this page) Printed by the Employees' Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 521189 V. Description of the invention (7) Brother 14 The picture is the first 〇 Demonstration of the part of the picture used to receive the packet The flowchart of the operation of the example; Figure 15 is the flowchart of the specific embodiment of the logical operation of Figure 10, which is used to process some and _ months of the δ months to find the packet. Fig. 10 is used to ^ a part of the packet processing logic of the reply packet to demonstrate the specific embodiment of the operation flowchart; Fig. 17 is a diagram of Fig. 10 used as 仏 _ part of the packet processing logic to start the packet demonstration Flowchart of the operation of the specific embodiment; Figure 18 is a block diagram showing an exemplary embodiment of a Ufo packet containing a buffer memory release field; Figure 19 is a demonstration of an I / O secondary system For example, the block diagram of this I / O secondary system includes a main bridge and a plurality of μ-points connected by links. It is similar to the connection shown in Figures 1 and 2. Figure 20 is a table illustrating packets used for uncoordinated connections. Define exemplary specific embodiments; (Figure 21 is a diagram of an exemplary non-coordinated request that can be used to process the system; ^ Figure 22 is a diagram of a sample non-coordinated response packet that can be used to process the system; The picture shows 1/0 of the I / O secondary system in Fig. 19 Section f * begin < Block diagram of the specific embodiment of Wei Wei; ^ Fig. 24 is a diagram of the node logic for packet reception in Fig. 23 ~ Dry bucket < Operation flow chart of the non-performing part; Fig. 25 is 24 The paper size of the node logic used to process the request packet is applicable to the Chinese National Standard (CNS) A4 specification (210 X 297 public love ^ — / 91890 890 & & 装 订 订 --- order ----- ------ ^^ 1 (Please read the notes on the back before filling out this page) 521189 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 -------— B7_______ V. Description of Invention (8) Fig. 26 is an operation flowchart of the exemplary part of the node logic used to process the reply packet in Fig. 24; Fig. 27 is the operation of the exemplary part of the node logic used to initiate the packet in Fig. 24 Flow chart; and Figure 28 is a table listing exemplary sequence rules that can be implemented by the major bridges of Figure 19. Although the present invention allows different modifications and alternative forms, specific specific embodiments thereof are shown by way of example in the drawings and will be described in detail herein. It should be understood that 'however, the accompanying drawings and detailed description are not intended to limit the invention to the particular form disclosed, but on the contrary, the intention is to cover all the spirit and scope of the invention as defined by the scope of the appended patent application. Modifications here, equivalents and choices. [Detailed Description of the Invention] System Overview A specific embodiment of the computer system 10 is shown with reference to FIG. 1 '. Other specific embodiments of the computer system 10 are possible and considered. In the specific embodiment of FIG. 1, the computer system 10 includes a plurality of processing nodes 12A, 12B, 12C, and 12D, although more or fewer processing nodes may be used. Each processing node is connected to the individual memories 14A to 14D via the memory controllers 16A to 16D included in each individual processing node 2a to 12D. The memory address space of the computer system 10 is distributed throughout the memories 14A to 14D, so that the system 10 has a distributed memory system. In addition, the processing nodes 12A to 12D include interface logic for communication between the processing nodes 12A to 12D. 11 — — — — — — · I ------ Order · -------- f Please read the notes on the back before filling out this page} This paper size applies Chinese National Standard (CNS) A4 Specifications (210 X 297 meals) 8 91890 521189 A7 B7 V. Invention description (9) For example, processing node 12A includes interface logic 18 to communicate with processing node 12b, interface logic 18B communicates with processing node 12c, and a third interface Logic 18C communicates with another processing node (not shown). Similarly, the processing node 12B includes interface logics 18D ′ and 18p; the processing node includes interface logics 18G, 18H, and 181; and the processing node 12D includes interface logics 18J, 18K, and 18L. The processing node 12D is connected to communicate with the I / O bridge 20 via the interface logic i8] L. Other processing nodes can communicate with other 1/0 bridges in a similar manner. The 1/0 bridge 20 is connected to the I / O bus 22. The processing nodes 12A to 12D implement a packet-based two-way connection 24 as communication between the processing nodes. In this specific embodiment, the two-way connection is implemented with a set of one-way = paths (for example, line 24A is used to transmit packets from processing node 12A to processing node 12B 'and line 24B is used to transmit packets from processing node 12β to processing node 12A). The other sets of lines 24c to 24H are used to transfer packets between other processing nodes as illustrated in FIG. Connections can be quickly coordinated in a buffered storage area, as communication between processing nodes (,, coordinated connections, or in a non-coordinated manner, as processing nodes and 1 / 〇 胄 beams ("non-coordinated connections).) In addition, non-coordinated connections It can be implemented with a link chain connection structure between 1/0 devices to replace 1/0 bus 22. The connection of two or more nodes via coordinated connection is called, coordinated structure, and similarly, via non- The connection between two or more nodes that are tuned is called a "non-coordinated connection." It should be noted that a packet to be transmitted by a processing node to another can pass one = multiple intermediate nodes. For example, one by processing The packet sent by node M to point 12D at point P can be processed by processing node or processing node I]., • As shown in Figure 1, any appropriate routing algorithm can be used. ^ Zhang scale suitable grid (210 7 9 91890 521189 A7 B7 V. Description of the invention (10) The memories 14A to 14D may include any suitable memory device. For example, the memories 14A to 14D may include one or more RAMBUS dynamic random access memories (RDRAMs), the same Dynamic random access memory (SDRAMs), static random access memory, etc. As mentioned above, the address space of the computer system 10 is specified throughout the memory 14A to 14D. Each processing node 12A to 12D may contain a memory map Map to determine which address maps to that memory 14A to 14D, and therefore a memory request for a specific address needs to be arranged at one of the processing nodes 12A to 12D and needs to be routed. In a specific embodiment The coherent point of the address in the computer system 10 is the specific memory controllers 16A to 16D connected to the memory storage bytes corresponding to the address. In other words, the memory controllers 16A to 16D are responsible for ensuring each The memory accesses to the corresponding memories 14A to 14D are generated in a coordinated manner in a fast buffer storage area. The memory controller 6 A to 16D may include control circuits to serve as the interface from the memory 14 to the ud. In addition, the memory The body controllers 16A to 16D may include a request sequence to arrange the memory requests. In general, the logic interfaces 18A to 18L may include a buffer memory to receive packets and buffers from a bidirectional connection The packet sent on the connection. The computer system Π) enables the flow control mechanism to send packets. Example 2: The interface logic in each node can store some buffers of each type ... the other end of the communication connection In the interface logic of the receiving node. A node does not transmit packets until the receiving node has an idle buffer memory as a storage packet. When each buffer misstores a packet in the receiving node), the receiving node transmits " This paper size applies ... 10

I 91890 521189 經濟部智慧財產局員工消費合作社印製 11 91890 A7 五、發明說明(η ) 至傳送節點,指示緩衝儲存器已釋放。此類機構稱之為,, 聯單基礎”系統。 參照第2圖,顯示一個說明處理節點12Α與12β之 區塊圖,以說明其中之雙向連接24之示範具體實施例。通 訊連接24之其他具體實施例為可能及考慮。於第2圖之具 體實施例,雙向連接24包含單向線路24Α與單向線路 24Β。線路24 Α包含時脈信號線路(CLK) 24ΑΑ、控制信號 線路(CTL) 24Α至Β、及命令/位址/資料匯流排(Cad) 24AC。相似地,線路24b包含時脈信號線路24ba、控制 L號線路24BB、及命令/位址/資料匯流排24BC。 時脈線路傳送時脈信號,指示用於控制線路與命令/ 位址/資料匯流排之樣本點。於一個特定具體實施例,資料 控制位元於時脈信號之每個邊緣(即,上升邊緣與下降邊 緣)傳送。因此,每個時脈週期每條線路有兩個資料位元可 傳送傳送每條線路一個位元所使用之時間於此稱之為,, 位元時間。上述提及之具體實施例每個時脈週期包含兩個 位7G時間。一個封包可傳送橫越兩個或多個位元時間。可 使用夕個時脈線路,根據命令/位址/資料匯流排之寬度。 例如四個時脈線路可用於一個32位元命令/位址/資料 匯流排。 控制線路指示於命令/位址/資料匯流排上傳送之資料 疋否為控制資訊之位元時間或資料之位元時間。控制線路 將確立以指不控制資訊之位元時間,及不確立以指示資料 之位元時間。杳粗 __^貝料可緊接於對應控制資訊後。於一個具體 本纸張尺錢 裝--------訂---------AWI (請先閱讀背面之注意事項再填寫本頁) 慧 5氏張尺家標準(CNS)A4規格⑽Χ 521189 五、發明說明(12) 實施例’其他控制資訊可能中斷資料之傳送。此類中斷可 於控制線路確立時,藉由於傳送資料與傳送控制資訊之位 兀時間期間,確立控制線路一些位元時間而履行。中斷資 料之控制資訊可能不指示其次將為資料。此外,於一個具 體實施例,控制線路於傳送控制資訊時可能不確立以指示 拖l位元時間。控制線路之一個隨後再癌立可指示控制資 訊繼續。 "P令/位址/資料匯流排包含一組線路以傳送資料/控 制位元。於一個具體實施例,命令/位址/資料匯流排可包 含8、16,或32條線路。根據設計選擇,每個處理節點或 卯橋樑可使用線路支持數量之任何一個。其他具體實施 例可依要求支持其他大小之命令/位址/資料匯流排。 根據一個具體實施例,不同信號可使用於命令/位址/ 資料匯流排料料脈料。或者,線路可攜帶有效 料(即,邏輯"Γ,於線路上以低電壓表示’且邏輯”〇"以高電 壓表不)或有效冑資料(其中邏輯"”於線路上j^電 不,且邏輯”〇”以低電壓表示)。 於電腦系統10裡傳送之封包可通過—個或多個 =節點。例如’於系Μ。裡一個由處理節: 至處理節點12D之封包可通過處理節點12Β或處理t 12c(見第i圖卜若處理節點 即♦I 91890 521189 Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 11 91890 A7 V. Description of the invention (η) to the transmitting node, indicating that the buffer storage has been released. This type of organization is called, "Combined Order Basic" system. Referring to Figure 2, a block diagram illustrating processing nodes 12A and 12β is shown to illustrate an exemplary embodiment of a bidirectional connection 24 among them. Communication connection 24 and other The specific embodiment is possible and considered. In the specific embodiment of FIG. 2, the bidirectional connection 24 includes a unidirectional line 24A and a unidirectional line 24B. The line 24A includes a clock signal line (CLK) 24AA and a control signal line (CTL) 24A through B, and the command / address / data bus (Cad) 24AC. Similarly, the line 24b includes a clock signal line 24ba, a control L line 24BB, and a command / address / data bus 24BC. Clock line Transmits clock signals indicating sample points used to control lines and commands / addresses / data buses. In a specific embodiment, data control bits are located on each edge of the clock signal (ie, rising and falling edges). ) Transmission. Therefore, each clock cycle has two data bits per line. The time used to transmit and transmit one bit per line is called here, the bit time. In the embodiment, each clock cycle includes two bits of 7G time. One packet can transmit two or more bit times. One clock line can be used according to the width of the command / address / data bus. For example Four clock lines can be used for a 32-bit command / address / data bus. The control line indicates whether the data transmitted on the command / address / data bus is the bit time or bit of the control information. Time. The control line will be established to refer to the bit time that does not control the information, and the bit time that is not established to indicate the data. The thick __ ^ shell material can be immediately after the corresponding control information. In a specific paper ruler Money equipment -------- Order --------- AWI (Please read the precautions on the back before filling in this page) Hui 5's Zhang ruler home standard (CNS) A4 specification ⑽ 521189 V. Description of the Invention (12) Embodiment 'Other control information may interrupt the transmission of data. Such interruption can be performed when the control line is established due to the establishment of some bit time of the control line during the transmission of data and the transmission of control information. .Control information for interrupted data is available Do not indicate that the data will be the next. In addition, in a specific embodiment, the control line may not be established to indicate the delay time when transmitting the control information. One of the control lines may instruct the control information to continue later. &Quot; P The order / address / data bus contains a set of lines to transmit data / control bits. In a specific embodiment, the command / address / data bus can include 8, 16, or 32 lines. Depending on the design choice, each Each processing node or bridge can use any of the number of lines supported. Other specific embodiments can support commands / addresses / data buses of other sizes as required. According to a specific embodiment, different signals can be used for commands / addresses / Data bus discharge material pulse. Alternatively, the line can carry valid materials (ie, logic " Γ, which is represented by a low voltage on the line, and logic " expressed by a high voltage) or valid data (where logic " "is on the line j ^ No electricity, and logic "0" is represented by low voltage). Packets transmitted in the computer system 10 may pass through one or more = nodes. For example, 'in line M. Here is the processing section: The packet to processing node 12D can be processed by processing node 12B or processing t 12c (see Figure i. If the processing node is

a ^ 得迗協調封包至處理IS 點12B,處理節點12B可接收封包, 即 理節點12D。另一方面,芸虛f封包轉送至處 處理…, 郎點叫專送協調封包至 處理即點12C,處理節,點以可 于匕至 ~----- 接耆將封包轉 91890a ^ The packet can be coordinated to the processing IS point 12B, and the processing node 12B can receive the packet, that is, the processing node 12D. On the other hand, the Yun f packet is forwarded to processing ..., Lang Dian called to send the coordinated packet to the processing point 12C, the processing node, the point can be reached ~ ----- then transfer the packet to 91890

Aw ^--------^--------- (請先閱讀背面之注意事項再填寫本頁) 12 521189 A7 經濟部智慧財產局員工消費合作社印製 五、發明說明(13 ) 运至處理節點12D。任何適#封包路由演算規則可於電腦 系統10裡使用。電腦系統10之其他具體實施例可包含比 第1圖具體實施例更多或更少之處理節點i 2。 電腦系統10裡使用之協調封包可具不同袼式,且可 I吝不同資料。第3至6圖說明可使用於處理次系統u 之不靶協調封包形式。第3至5圖分別說明示範協調資訊、 請求與答覆封包、且第6圖說明—個示範協調資料封包。 貧訊(info)封包攜帶有關通訊連接一般操作之資訊,例如 流量控制資訊、錯誤狀態等。請求、與答覆封包攜帶有關 執行之控制資訊。一些請求與答覆封包具體指定隨後之資 料封包。貧料封包攜帶關於執行與對應請求或答覆封包之 貧料。其他具體實施例可使用不同封包格式。 第3至6圖之示範封包形式顯示於連續,,位元時間,,, 平行傳送之八位元位元組之位元7_〇内容。用於傳送封包 (例如位元組)每個資料單元之時間總數於此稱為,,位元$ 間”。每個位元時間為CLK信號之部份週期。例如,於 信號單一週期裡,第一位元組可能於CLK信號上升邊緣傳 送,且一個不同位元組可能於CLK信號下降邊緣傳送。於 此情況,位元時間為CLK信號週期之一半。圖中無提供數 值之位元時間乃保留給特定封包,或用於傳送特定封包之 貧訊。由虛線所指示之領域指示並非包含於某些種類所有 封包之選擇性領域。 第3圖為可使用於處理次系統12裡之一個示範協調 tm⑽0)封包30之圖示。1nf0封包30包含四個位元 ‘紙張尺度適用中關家標準(CNS)A4規格⑽χ视公爱 91890 (請先閱讀背面之注音?事 項再填 --------訂--------I ^_wi . 填寫本頁) 13 521189 B7 五、發明說明(w ) 時間於一個八位元協調通訊 叫5:〇]於第一位元時間(即,位。-二位元命令領域c 圖之請求與答覆封包於位元m〇)傳送。第4與5 同位元位置。杏户自丁 A ^ 3相似命令編碼於相 田仏忍不包含位 傳送信息於最鄰近處理節 4 〇#包30可用以 由,且因此,不需任何缓各9貞讯封包並非於結構裡路 訊封包可用以傳儲存器於接收節點。此外,資 了匕了用以傳送信息, 衝儲存器之釋放。其他種類資訊二,流量計畫裡缓 封包與不操作(Ν〇Ρ)封包,如第7=3系統同步(SynC) 體實施例,信息協定可能要求資田說明。於一個具 時需於其終點節點被接受。"不*流量控制且隨 封包可使用於處理次系統12裡之示範協調請求 位:圖不。請求封包32包含八個位元時間於一個八 二::調通訊連接。請求封包32可用於起始執行⑽如, 固項取或寫入執行),及對於那些攜帶執行作用之位址之 :求’於完成執行過程中傳送請求。大體而言,請求封包 指示將由終點節點履行之操作。 命令領域Cmd[5:0]之位元辨識請求種類於位 ❹ 期間傳送。來源單元領域SrcUnit[1:〇]之位元,复包 識來源節點裡來源單元之數值,亦於位元時間〇傳送^ 腦系統ίο裡之單元種類可包含記憶體控制器、快速2衝儲 存區、處理器等。包含辨識起始執行之節點之數值之來 節點領域SrcNode[2:0]之位元,於位元時間i期間傳送源 包含唯一辨識終點節點之數值之終點# '° _______ 即點領域 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐 521189 經濟部智慧財產局員工消費合作社印製 A7 五、發明說明(15 )Aw ^ -------- ^ --------- (Please read the notes on the back before filling out this page) 12 521189 A7 Printed by the Consumers ’Cooperative of Intellectual Property Bureau of the Ministry of Economic Affairs (13) Transport to processing node 12D. Any suitable packet routing algorithm can be used in the computer system 10. Other embodiments of the computer system 10 may include more or fewer processing nodes i 2 than the embodiment of FIG. 1. The coordinated packets used in the computer system 10 may have different formats and may contain different data. Figures 3 to 6 illustrate the form of untargeted coordinated packets that can be used to process the sub-system u. Figures 3 to 5 illustrate model coordination information, request and reply packets, respectively, and Figure 6 illustrates a model coordination data packet. The info packet carries information about the general operation of the communication connection, such as flow control information, error status, and so on. Requests, and response packets carry control information about execution. Some request and reply packets specify subsequent data packets. The lean packet carries lean information about the execution and response request or reply packets. Other embodiments may use different packet formats. The exemplary packet formats of Figs. 3 to 6 are shown in the contents of bits 7_〇 of the octet, which are transmitted continuously, in bit time, and in parallel. The total amount of time used to transmit each data unit of a packet (such as a byte) is referred to herein as "bit $". Each bit time is part of the period of the CLK signal. For example, in a single period of a signal, The first byte may be transmitted on the rising edge of the CLK signal, and a different byte may be transmitted on the falling edge of the CLK signal. In this case, the bit time is one and a half of the CLK signal period. No bit time is provided in the figure It is reserved for specific packets, or used to transmit specific packets. The fields indicated by the dotted lines indicate optional fields that are not included in all types of packets. Figure 3 shows one of the sub-systems 12 that can be used for processing. Demonstration coordination tm⑽0) Illustration of packet 30. 1nf0 packet 30 contains four bits' paper size applicable to Zhongguan Family Standard (CNS) A4 specifications ⑽χ depending on public love 91890 (Please read the note on the back? Fill in the matter --- ----- Order -------- I ^ _wi. Fill in this page) 13 521189 B7 V. Description of invention (w) Time in one octet coordinated communication call 5: 〇] in the first digit Time (ie, bit.-Two bit command field c figure please The reply packet is transmitted in bit m0). The 4th and 5th parity positions. Apricot from Ding A ^ 3 is similar to the command code encoded in the Aida field. It does not contain bit transmission information in the nearest processing section 4 0 # 30 can be used to Because, and therefore, no need to delay any 9 packets, not in the structure, the packet can be used to transfer the memory to the receiving node. In addition, it has been used to transmit information and release the memory. Other types of information Second, the flow meter draws slow packets and non-operational (NOP) packets, such as the 7th = 3 System Synchronization (SynC) embodiment, the information agreement may require information from the field. In a specific case, it needs to be terminated at its end node. Accept. &Quot; Do not * flow control and follow the packet can be used to process the demonstration coordination request bit in the sub-system 12: Figure No. The request packet 32 contains eight bit time in one eight two :: adjust the communication connection. Request packet 32 It can be used for initial execution (for example, fixed item fetch or write execution), and for those addresses that carry the execution role: seek 'to transmit the request during the completion of the execution. Generally, the request packet instruction will be performed by the end node. Fuck The type of bit identification request in the command field Cmd [5: 0] is transmitted during bit 。. The bit in the source unit field SrcUnit [1: 〇], which contains the value of the source unit in the source node, is also in the bit. Time 〇 Transmission ^ The types of units in the brain system can include memory controllers, fast 2-speed storage areas, processors, etc. Contains the bits in the node field SrcNode [2: 0] that identify the value of the node that started the execution , During the bit time i, the transmission source contains the end point that uniquely identifies the end point value # '° _______ Point field This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm 521189 Employees of the Intellectual Property Bureau of the Ministry of Economic Affairs Printed by Consumer Cooperative A7 V. Description of Invention (15)

DestNode[2:0]之位元 亦於位元時間1期間值 於路由封包至終點節點。 專迗且可用 " 匕3辨識位於接收封白夕玖单μ μ 點裡之終點單元數值 收封包之終點卽 終點單元領域DestUnitM·旧少a 元,亦於位元時間!期間傳送。 [_〇]之位 許多請求封包亦句人七 包含來源標籤領域SreT『4.〇 元於位元時間2,此办_ 士 agl4.〇J之位 此位疋時間2與來源節點 SrcN〇de[2:0】及來源單 斤即點項域 疋肩域SrcUnit[l: 〇],可唯一妯 包連接至封包為其一部於+# 笮地將封 邻伤之特定執行。位元時間3可用於 一些請求以傳送受勃钚从m J用於 一 χ q 執仃作用之記憶體位址之最低有效位 兀。位兀時間4至7用於捕1 , 131 、傳送位址領域Addr[39:8]之位元, 此位址領域包含受執行影燮 > 1丁办響之位址之取咼有效位元。 32裡一些未定義領域可用 X J用於各種请求封包以攜帶特 令之資訊。 第5圖為可使用於處理次系 处埋人糸統12裡之一個示範協調 答覆封包34之圖示。答覆封包34包含命令領域 Cmd[5:0]、終點節點領域DestN〇de[2:〇]、與終點單元領域 DestUnitH :〇]。終點節點領域DestN〇de[2:〇]辨識答覆封包 (於若干情況下,此答覆封包可為執行之來源節點或目標節 點)之終點節點。終點單元領域DestUnit[1:〇]辨識終點節 點裡之終點單元。不同型式之答覆封包可包含額外資訊即 例如,一個讀取答覆封包可指示於隨後資料封包所提供之 讀取Η料總數。探查答覆可指示請求之快速緩衝儲存區巴 塊之副本是否為探查節點(使用選擇性共享位元” Sh”於位 元時間3)所保留。 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公爱) 91890 裝--------訂--------- (請先閱讀背面之注意事項再填寫本頁) 521189 A7The bits of DestNode [2: 0] are also used to route packets to the destination node during bit time 1. Specialized and available " Dagger 3 to identify the end unit value in the single μ μ point of the receiving envelope. End point of the received packet. End unit unit DestUnitM · Old and young a yuan, also in bit time! During transmission. [_〇] The position of many request packets also includes the source tag field SreT "4.00 yuan at bit time 2, this office _ 士 agl4.〇J's position at time 2 and the source node SrcNode [2: 0] and the source single-point item field and shoulder field SrcUnit [1: 〇], the only packet that can be connected to the packet is a specific implementation of + # to seal the adjacent injury. Bit time 3 can be used for some requests to transmit the least significant bit of the memory address affected by m J for a χ q execution. Bit times 4 to 7 are used to capture the bits of 1,131 and addr [39: 8] in the address field. This address field contains the effective bits of the address affected by the execution> 1. yuan. Some undefined fields in 32 are available. X J is used for various request packets to carry special order information. Figure 5 is an illustration of a sample coordinated response packet 34 that can be used to process the secondary system 12 embedded in the system. The reply packet 34 includes a command field Cmd [5: 0], a destination node field DestNode [2: 〇], and a destination unit field DestUnitH: 〇]. The destination node field DestNode [2: 〇] identifies the destination node of the reply packet (in some cases, this reply packet can be the source node or target node for execution). The destination unit field DestUnit [1: 0] identifies the destination unit in the destination node. Different types of reply packets may contain additional information, for example, a read reply packet may indicate the total number of read data provided in subsequent data packets. The probe response can indicate whether a copy of the requested cache block is reserved by the probe node (using the selective shared bit "Sh" at bit time 3). This paper size applies to China National Standard (CNS) A4 specification (210 X 297 public love) 91890 Packing -------- Order --------- (Please read the precautions on the back before filling in this (Page) 521189 A7

16 9189016 91890

II

經濟部智慧財產局員工消費合作社印製 521189 A7 --B7 五、發明說明(17 ) 含於位元時間〇與1在八位元連接期間傳送之資訊。相似 地,於32位元連接之封包位元時間〇可包含於位元時間〇 至3在八位兀連接期間所傳送之資訊。 下列公式1與2說明根據八位元連接之位元時間,一 個16位元連接位元時間〇及32位元連接之位元時間之形 成。 BT016[15:0] = BTl8[7;〇] I) BT28[7:〇] ⑴ BT032[31:〇] = BT38[7:〇] II BT28[7;〇] // BTl8[7:〇] // BT08[7:0] (2) 第7圖為表格38,列出可使用於處理次系統之不 同種類協調封包。處理次系統12之其他具體實施例為可能 及予考慮’且可包含其他適當封包類型與命令領域譯碼 組。表格38包含命令碼攔,此命令碼攔包含用於每個協調 命令之命令領域Cmd [5:0]内容,包含助記符號表示命令之 命令欄,及封包類型攔,此封包類型攔指示那個協調封包 30、32、與34(及資料封包36,於此具體指定)使用於此命 令。表格38裡一些命令之簡略功能說明提供於下。 一個讀取執行可使用定大小之讀取(Read(sized)請 求、讀取區塊(RdBlk)請求、讀取區塊共享(RdBlks)請求、 或具修改(RdBlkMod)讀取區塊請求起始。Rea(j(sized)請求 用於不可快取讀取或讀取與快速緩衝儲存區區塊大小不同 之資料。欲讀取之資料總數編碼至Read(Sized)請求封 包。關於快速緩衝儲存區區塊之讀取,可使用RdBlk請求, 除非:(0要求快速緩衝儲存區區塊之一個可寫入副本, -----------ϋ裝--------訂---------· (請先閱讀背面之注意事項再填寫本頁) 本紙張尺度適用中國國家標準(CNS)A4規格(2】〇 X 297公釐) 17 91^90 521189 經 濟 部 智 慧 財 產 局 員 工 消 費 合 作 社 印 製 91890 A7 B7 五、發明說明(1S ) 於此情況下可使用RdBlkMod請求;或(ii)要求快速緩衝 儲存區區塊之一個可寫入副本,但無意修改已知之區塊, 於此情況下可使用RdBlkS請求。RdBlkS請求可用以更有 效率地產生某些種類之連貫計畫(例如,目錄基礎連貫計 畫)。 一般而言,為起始執行,適當讀取請求由來源節點傳 送至擁有對應於快速緩衝儲存區區塊之記憶體之目標節 點。目標節點裡之記憶體控制器傳送Pr〇be請求至系統裡 其他節點以維持連貫,藉由改變那些節點裡之快速緩衝儲 存區區塊狀態與促使包含快速緩衝儲存區區塊更新副本之 節點發送快速緩衝儲存區區塊至來源節點。每個接收pr〇be 請求之節點傳送一個探查答覆(probeResp)封包至來源節 點。 若探查之節點具讀取資料(即,污穢資料)之一個修改 田4本’此節點傳送讀取答覆(RdReSp〇nse)封包與污穢資料 至來源節點。傳送污穢資料之節點亦傳送記憶體撤銷 (MemCancel)答覆封包至目標節點,以試圖撤銷由目標節 點傳送之請求讀取資料。此外,目標節點裡之記憶體控制 器使用貧料封包裡之資料於其後之RdResp〇nse答覆封 包,傳送請求讀取資料。 若來源節點由一個探查之節點接收一個RdResp〇nse 各覆封包,則將使用所接收之讀取資料。否則,將使用由 標節點來之^料。一旦每個探查答覆與讀取資料於來源 節點接收則來源節點傳送來源完成答覆封包至 ^尺度適用中鮮们 -----------•裝--------訂---------AWI (請先閱讀背面之注意事項再填寫本頁) 521189Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 521189 A7 --B7 V. Invention Description (17) Contains information transmitted in bit time 0 and 1 during the connection of eight bits. Similarly, a packet bit time 0 of a 32-bit connection may contain information transmitted during bit-time connections 0 to 3 during an eight-bit connection. The following formulas 1 and 2 illustrate the formation of a 16-bit connection bit time 0 and a 32-bit connection bit time according to the bit time of the 8-bit connection. BT016 [15: 0] = BT18 [7; 〇] I) BT28 [7: 〇] ⑴ BT032 [31: 〇] = BT38 [7: 〇] II BT28 [7; 〇] // BTl8 [7: 〇] // BT08 [7: 0] (2) Figure 7 is Table 38, which lists the different types of coordinated packets that can be used to process the secondary system. Other specific embodiments of the processing subsystem 12 are possible and considered ' and may include other appropriate packet types and command field decoding groups. Table 38 contains the command code block. This command code block contains the content of the command field Cmd [5: 0] for each coordinated command, including the command column for the mnemonic symbol indicating the command, and the packet type block. This packet type block indicates which Coordinated packets 30, 32, and 34 (and data packet 36, specifically specified here) are used in this command. Brief functional descriptions of some commands in Table 38 are provided below. A read execution can use a read (sized) request, a read block (RdBlk) request, a read block sharing (RdBlks) request, or a read block request with a modification (RdBlkMod). .Rea (j (sized) request is used for non-cacheable reading or reading data that is different in size from the fast buffer storage area. The total amount of data to be read is encoded into the Read (Sized) request packet. About fast buffer storage area To read, you can use the RdBlk request, unless: (0 requires a writable copy of the cache area, ----------- install -------- order-- ------- · (Please read the notes on the back before filling out this page) This paper size applies to China National Standard (CNS) A4 (2) 0X 297 mm 17 91 ^ 90 521189 Wisdom of the Ministry of Economic Affairs Printed by the Consumer Cooperative of the Property Bureau 91890 A7 B7 V. Description of the invention (1S) In this case, the RdBlkMod request can be used; or (ii) A writeable copy of the fast-buffer storage block is required, but there is no intention to modify the known block In this case, the RdBlkS request can be used. The RdBlkS request can be used to change the Efficiently generate certain kinds of coherent plans (for example, directory-based coherent plans). Generally, for initial execution, the appropriate read request is transmitted from the source node to the one that has the memory corresponding to the cache block. Target node. The memory controller in the target node sends PrObe requests to other nodes in the system to maintain coherence, by changing the state of the cache blocks in those nodes and prompting the nodes containing updated copies of the cache blocks. Send the fast buffer storage block to the source node. Each node that receives the pr0be request sends a probeResp packet to the source node. If the probed node has a modification field that reads data (ie, foul data) 4 This node sends a read response (RdReSpoon) packet and foul data to the source node. The node that sends the foul data also sends a MemCancel reply packet to the target node in an attempt to revoke the request read sent by the target node Data. In addition, the memory controller in the target node uses a lean packet The data is subsequently replied by RdResp〇nse to send a request to read the data. If the source node receives one RdResp〇nse packet from a probed node, the received read data will be used. Otherwise, it will use The data from the node. Once each probe response and read data is received at the source node, the source node sends the source to complete the response packet to the standard. ----- Order --------- AWI (Please read the notes on the back before filling in this page) 521189

目標節點,作為執行終止之確定之確認。 經濟部智慧財產局員工消費合作社印製 一個寫入執行可使用定大小之寫入(Wr(sized))請求封 包或犧牲區塊(VicBlk)請求封包起始,且對應資料封包跟 隨其後。Wr(Sized)請求用於不可快取寫人或與快速緩衝 儲存區區塊大小不同之資料寫入。為維持Wr(Sized)請求 之連貫,目標節點裡之記憶體控制器傳送Pr〇be請求至系 統裡其他每個節點。為答覆Pr〇be請求,每個探查節點傳 送ProbeResp答覆封包至目標節點。若探查節點儲存污穢 貧料,探查節點以RdResponse答覆封包與污穢資料答覆。 以此方式,由Wr(Sized)請求更新之快速緩衝儲存區區塊 返回至記憶體控制器,與由Wr(Sized)請求提供之資料合 併。記憶體控制器,當由每個探查節點接收到探查答覆後, 傳送一個目標完成(TgtDone)答覆封包至來源節點,以提 供執行終止之確定之確認。來源節點以SrcD〇ne答覆封包 回應。 已經節點修改並放回至節點裡之快速緩衝儲存區之 犧牲快速緩衝儲存區區塊,使用vicBlk請求封包傳送回記 憶體。VicBlk請求不需探查。因此,當目標記憶體控制器 準備好將犧牲區塊資料送至記憶體,目標記憶體控制器傳 送TgtDone答覆封包至犧牲區塊之來源節點。來源節點以 SrcDone答覆封包答覆以指示資料需送出,或以 MemCancel答覆封包答覆以指示資料已於傳送vicBik請 求與接收TgtDone答覆封包(例如,答覆一個干預探查)間 無效。 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公爱) 91890 Αν- Μ ^---------AWI (請先閱讀背面之注意事項再填寫本頁) 19 521189 A7The target node is used as confirmation of the termination of execution. Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A write execution can use a fixed size write (Wr (sized)) request packet or a victim block (VicBlk) request packet start, and the corresponding data packet follows. The Wr (Sized) request is used for data writes that are not cacheable writers or different from the cache block size. To maintain the consistency of Wr (Sized) requests, the memory controller in the target node sends a PrObe request to every other node in the system. To respond to the PrObe request, each probe node sends a ProbeResp reply packet to the target node. If the probing node stores dirty and poor materials, the probing node responds with RdResponse reply packets and contamination data. In this way, the flash cache block requested by Wr (Sized) is returned to the memory controller and merged with the data provided by Wr (Sized). The memory controller sends a target completion (TgtDone) reply packet to the source node after each probe node receives a probe response to provide confirmation of execution termination. The source node responds with a SrcDone reply packet. The sacrifice cache area block that has been modified by the node and returned to the cache area in the node uses vicBlk to request a packet to be sent back to the memory. VicBlk requested no investigation. Therefore, when the target memory controller is ready to send the victim block data to the memory, the target memory controller sends a TgtDone reply packet to the source node of the victim block. The source node responds with a SrcDone reply packet to indicate that the data needs to be sent, or a MemCancel reply packet to indicate that the data has been invalidated between sending the vicBik request and receiving a TgtDone reply packet (eg, responding to an intervention probe). This paper size applies to China National Standard (CNS) A4 specifications (210 X 297 public love) 91890 Αν- Μ ^ --------- AWI (Please read the precautions on the back before filling this page) 19 521189 A7

經濟部智慧財產局員工消費合作社印製 —個污穢(ChangetoDirty)請求封包之改變可由來源節 點傳迭,以為了獲得由來源節點儲存,於一個不可寫入^ ^快速緩衝儲存區區塊之寫入允許。以Changet〇Dirty 請$起始之執行與讀取執行操作相似,除了目標節點不送 回貧料外。若來源節點打算更新整個快速緩衝儲存區區 塊三則一個有效區塊(ValidateBIk)請求可用以獲得非由來 源節點儲存之快速缓衝儲存區區塊之寫入允許。於此類執 行,沒有資料轉移至來源節點,但除此之外與讀取執行操 作相似。 目標可使用目標開始(TgtStart)答覆以指示執行已經 開始(例如,安排隨後之執行)。一個不操作(N〇p) inf〇封 包可用以轉移節點間之流量控制資訊(例如,緩衝儲存器閒 置指不)。一個Broadcast請求封包可用以廣播節點間之信 …(例如,为配中斷)。敢後,同步^丫⑽)inf〇封包可用以 同步節點操作(例如,錯誤偵測、重新啟動、起始等)。 表袼38亦包含虛擬通道(Vehan)欄。vchan攔指示每 個封包行進之虛擬通道(即,至每個封包所屬)。於本具體 實施例,定義四個虛擬通道··非後命令(Npc)虛擬通道、 後命令(PC)虛擬通道、答覆(R)虛擬通道、及探查(p)虛擬 通道。 虛擬通遺 接著參照第8圖,兩個虛擬通道40A與40B及其與 處理節點12A至12D之關係以圖表說明。雖然僅顯示兩個 虛擬通道’需瞭解的是電腦系統其他具體實施例可使用 丨 I 11 --------訂--------I (請先閱讀背面之注意事項再填寫本頁) 本紙張尺度適用中國國家標準(CNS)A4規格(21〇 297公釐) 20 91890 521189 經濟部智慧財產局員工消費合作社印製 A7 五、發明說明(21 ) 任何適當數目之虚擬通道。 -般而言,"虛擬通道"為-個通訊途徑以攜帶封包於 不同節點間。每個虛擬通道與其他虛擬通道之資源獨立 (即,於虛擬通道流通之封包,就實際傳送而言,通常不為 另一虛擬通道裡之封包存在或缺少所影響)。封包根二封包 種類分派至虛擬通道。於相同虛擬通道之封包實際上可能 與其他傳送衝突(即’相同虛擬通道裡之封包可^遇資源 衝突)’但不會與不同虛擬通道裡之封包傳送實際衝突。 某些封包邏輯上可能與其他封包衝突(即,由於協定原 因、連貫原因、或其他此類原因,一個封包可能邏輯上與 其他封包衝突)。若第一封包,由於邏輯/協定原因,需於 第二封包抵達其終點節點前,抵達其終點節點,電腦系統 可能陷入僵局,若第二封包實際上阻隔第一封包之傳送(例 如,藉由佔據衝突資源)。藉由分派第一與第二封包至分離 虛擬通道,且藉由於電腦系統裡施行傳送媒介,使得於分 離虚擬通道之封包不能阻隔彼此之傳送,無僵局操作便可 達成。需注意的是由不同虛擬通道來之封包將於相同實際 聯繫(例如第1圖之線路24)上傳送。然而,因接收緩衝= 存器可於傳送前取得,虛擬通道不會彼此阻隔,即使當使 用此共享資源。 田 每個不同封包類型(例如,每個不同命令領域 CMD [5.0])可分派至其虛擬通道。然而,確保虛擬通遒實 際上不衝突之硬體將隨著虚擬通道數目而增加。例如,於 一個具體實施例,個別儲存器分配至每個虛擬通道。 本紙張尺度適用中關規格⑽x2m) -_ -- 21 9R9〇 I --------^--------- (請先閱讀背面之注意事項再填寫本頁) 521189Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs-a change (Dirty) request packet change can be transmitted by the source node in order to obtain storage by the source node in a non-writeable ^ ^ fast buffer storage block . Executions that start with Changet〇Dirty $ are similar to read operations, except that the target node does not send back poor data. If the source node intends to update the entire cache area 3, a ValidateBIk request is available to obtain write permission for the cache area that is not stored by the source node. In this type of execution, no data is transferred to the source node, but otherwise it is similar to the read execution operation. A target can use a TgtStart response to indicate that execution has begun (for example, scheduling a subsequent execution). A non-operational (Noop) inf packet can be used to transfer flow control information between nodes (for example, buffer storage is idle). A Broadcast request packet can be used to broadcast the message between nodes ... (for example, to interrupt the configuration). After you dare, synchronize the info packets to synchronize node operations (eg, error detection, restart, start, etc.). Table 袼 38 also contains the Virtual Channel (Vehan) column. The vchan block indicates the virtual channel that each packet travels (ie, to which each packet belongs). In this specific embodiment, four virtual channels are defined: a non-post-command (Npc) virtual channel, a post-command (PC) virtual channel, a reply (R) virtual channel, and a probe (p) virtual channel. Virtual legacy Next, referring to Fig. 8, the two virtual channels 40A and 40B and their relationship with the processing nodes 12A to 12D are illustrated graphically. Although only two virtual channels are displayed. 'It is necessary to understand that other specific embodiments of the computer system can be used. I 11 -------- Order -------- I (Please read the precautions on the back before (Fill in this page) This paper size is in accordance with Chinese National Standard (CNS) A4 specification (21,297 mm) 20 91890 521189 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 V. Invention Description (21) Any appropriate number of virtual channels . -In general, "virtual channel" is a communication channel to carry packets between different nodes. Each virtual channel is independent of the resources of other virtual channels (that is, the packets circulating in the virtual channel are usually not affected by the presence or absence of packets in another virtual channel in terms of actual transmission). Packet root two packet types are assigned to the virtual channel. Packets in the same virtual channel may actually conflict with other transmissions (ie, packets in the same virtual channel may encounter resource conflicts) but will not actually collide with packet transmissions in different virtual channels. Some packets may logically conflict with other packets (that is, one packet may logically conflict with other packets due to agreement reasons, coherence reasons, or other such reasons). If the first packet needs to reach its destination node before the second packet arrives at its destination node due to logical / protocol reasons, the computer system may be deadlocked. If the second packet actually blocks the transmission of the first packet (for example, by Occupy conflicting resources). By allocating the first and second packets to separate virtual channels, and because the transmission medium is implemented in the computer system, the packets in the separated virtual channels cannot block each other's transmission, and a deadlock-free operation can be achieved. It should be noted that packets from different virtual channels will be transmitted on the same physical connection (such as line 24 in Figure 1). However, because the receive buffer = registers are available before transmission, virtual channels will not block each other, even when using this shared resource. Each different packet type (for example, each different command field CMD [5.0]) can be assigned to its virtual channel. However, the hardware that ensures that virtual communications are virtually non-conflicting will increase with the number of virtual channels. For example, in a specific embodiment, an individual memory is allocated to each virtual channel. This paper size is applicable to Zhongguan specifications ⑽x2m) -_-21 9R9〇 I -------- ^ --------- (Please read the precautions on the back before filling this page) 521189

(請先閱讀背面之注音?事項再填寫本頁) -I I I , 裝 -----^--------- # I I I- 521189 經濟部智慧財產局員工消費合作社印製 A7 B7 五、發明說明(23 ) 道之封包可經由電腦系統10分別地路由。例如,行進於第 一虛擬通道,由節點12A至節點12D之封包可通過節點 12B ’而行進於第二虛擬通道’由節點12a至節點12〇之 封包可通過節點12C。每個節點可包含電路以確保於不同 虛擬通道之封包實際上不會彼此衝突。於非協調結構,由 一個I/O節點來之封包可通過該1/〇節點與主要橋樑間之 每個其他I/O節點(見第19圖)。需注意的是1/〇節點可以 與第8圖所顯示之相似方式連接至虛擬通道。 於下列更詳細說明之一個特定具體實施例,命令封包 緩衝儲存器分派至每個虛擬通道以緩衝行進於該虛擬通道 之封包。個別資料封包緩衝儲存器亦分派至可攜帶資料封 包之每個虛擬通道。藉由分離命令封包緩衝儲存嚣(其每一 個項目可包含相當少量之位元時間)與資料封包緩衝錯存 器(其每-個項目可包含相當大量之位元時間以保持快速 緩衝儲存區區塊),將可節省緩衝儲存器空間,同時仍提供 適當資料儲存。可施行比資料封包緩衝儲存器更多之人二 封包緩衝儲存器(因所有資料封包具對應請求或笈ϋ 包,但非所有對應請求或答覆封包具對應資料封包 理能力將提高同時更有效率地使用緩衝儲存器空間。地 第9圖為表格42,說明根據電腦系統1〇之具體實施 例所定義之虛擬itit。其他具體實施例為可能及予考慮 對於所顯示之具體實施例,定義四個虛擬通道。屬於= 連接之那些虛擬通道之封包顯示於第7圖,且屬於 連接之那些虛擬通道之封包顯示於第2〇圖。 〜 本紙張尺㈣时關家鮮(CNS)A4驗(210 X 29?1¥7 23 91890 -----------裝--------訂--------- (請先閱讀背面之注咅?事項再填寫本頁) 521189 經濟部智慧財產局員工消費合作社印製 91890 A7 五、發明說明(24) 一個特定請求可為"後”或”非後”請求。大體而言, 當請求與對應資料由來源節點傳送時(例如,藉由來源節點 裡之界面),一個後請求視為由來源節點完成。一個後請求 因此有政地於來源知點完成。結果,來源節點可發佈其他 請求並繼續其他操作,而封包或後請求之封包行進至目標 卽點且目標節點完成後請求。來源節點並非直接察覺何時 後凊求實際由目標節點完成。於一個示範具體實施例,協 調後請求封包包含後位元於作為虛擬通道辨識器之命令領 域。一個協調後請求,藉由於完成後請求於目標界面(例 如’非協調連接)前,傳送TgtDone答覆至來源節點,於協 調結構完成。 一個非後請求,相對於後請求,為一個於目標界面完 成前,未於來源界面完成之請求。以此方式,請求之來源 直接察覺(經由完成請求)請求已於目標完成。大體而言, 不同非後請求封包彼此間不具邏輯/協定衝突,因直到其到 達終點(即,執行目標)時,其間並無順序。因此,非後請 求封包可包含於一個虛擬通道。 於示範具體實施例,後與非後請求封包屬於分離虛擬 通道以提供與某些輸入/輸出(或周邊)匯流排協定之兼容 性。例如,周邊零件連接界面(PCI)匯流棑界面提供後寫 入。對於起源於PCI之操作,下列順序規則為PCI所要求: (i) 由相同來源之後寫入仍舊於目標界面上維持順 序, (ii) 其後跟隨由相同來源之讀取之後寫入,在讀取資 Μ氏張尺度適时國國家標準(CNS)A4規格⑵Q χ挪公^ ^~~~ — 裝 訂---------. (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 521189 五、發明說明(25) 料返回前,於目標界面上完成; (i i i)非後寫入可不超越由相同來源之後寫入;以及 (W)後寫入需允許超越先前非後請求。 要求(1)藉由放置後請求於後命令虛擬通道(且因此其 仍舊安排至一個特定目標)與某些由主要橋樑所施行之限 制而達成(見第28圖)。要求(ii)與(iii)為非協調結構上後請 求通道與非後命令通道間之邏輯衝突。有關非協調聯繫上 邏輯衝突之額外細節將於下面提供。當後寫入藉由施行某 二限制於主要橋樑,由非協調聯繫傳送至協調聯繫,要求 (η)與(iH)可達成(見第28圖)。要求(lv)可藉由提供個別後 命令、非後命令、與答覆虛擬通道而達成。 後與非後請求可引起探查請求封包之產生(以維持連 貫於協調結構裡)與答覆封包(以轉移資料與提供執行之確 定確認)。因此,探查封包與答覆封包並非如⑽與非後請 求包含於相同虛擬通道(以避免資源衝突與邏輯衝突而產 生僵局)。再者,探查封包可引起探查答覆與讀取答覆封包 之產生,且因此由答覆封包放置於分離虛擬通道。 答覆封包亦可產生額外答覆封包(例如,__與 聊_可使彼此產生)。因此,答覆封包可能與其他答覆 封包邏輯上衝突,若所有答覆封包分派至相同虛擬通道。 然而,分派答覆封包至數個不同虛擬通道為不希望的,因 其增加資源要求(例如,緩衝儲存 什器)以處理額外虛擬通 道。需注意的是答覆封包為請求 ^对巴(後或非後)之結果, 直接或間接地(斜如,經由產生以 ___ 乂谷覆睛求封包之探查)。(Please read the phonetic on the back? Matters before filling out this page) -III, Install ----- ^ --------- # II I- 521189 Printed by the Consumers ’Cooperative of Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7 5. Description of the Invention (23) The packets of the Tao can be routed separately via the computer system 10. For example, a packet traveling through the first virtual channel, node 12A to node 12D can pass through node 12B 'and a packet traveling through the second virtual channel' from node 12a to node 120 can pass through node 12C. Each node can contain circuitry to ensure that packets on different virtual channels do not actually conflict with each other. In a non-coordinated structure, packets from an I / O node can pass through each other I / O node between the 1/0 node and the main bridge (see Figure 19). Note that the 1/0 node can be connected to the virtual channel in a similar way as shown in Figure 8. In a specific embodiment described in more detail below, the command packet buffer memory is assigned to each virtual channel to buffer packets traveling on the virtual channel. Individual data packet buffers are also allocated to each virtual channel that can carry data packets. Packet buffer storage (each item can contain a significant amount of bit time) and data packet buffer misregisters (which can contain a significant amount of bit time per item to maintain fast buffer storage blocks by separating commands ) Will save buffer memory space while still providing proper data storage. Can implement more people than the data packet buffer storage. Second packet buffer storage (because all data packets have corresponding requests or packets, but not all corresponding requests or reply packets with corresponding data packet management capabilities will be improved and more efficient. The buffer memory space is used in the ground. Figure 9 on the ground is a table 42 illustrating the virtual itit defined according to the specific embodiment of the computer system 10. Other specific embodiments are possible and considered. For the specific embodiment shown, definition four Virtual channels. Packets that belong to the connected virtual channels are shown in Figure 7, and packets that belong to the connected virtual channels are shown in Figure 20. ~ This paper is closed at the time of Guan Jiaxian (CNS) A4 inspection ( 210 X 29? 1 ¥ 7 23 91890 ----------- Install -------- Order --------- (Please read the note on the back first? Matters then (Fill in this page) 521189 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 91890 A7 V. Description of Invention (24) A specific request can be a "back" or "non-post" request. Generally speaking, when the request is When the source node transmits (for example, by the source node Interface), a post request is considered to be completed by the source node. Therefore, a post request is politically completed at the source knowledge point. As a result, the source node can issue other requests and continue other operations, while the packet or post request packet proceeds to The target node and the target node request after completion. The source node does not directly detect when the subsequent request is actually completed by the target node. In an exemplary embodiment, the coordinated request packet contains the last bit in the command field as a virtual channel identifier. A post-coordination request is completed in the coordination structure by sending a TgtDone response to the source node before completing the request before the target interface (for example, 'uncoordinated connection'). A non-post request, as opposed to a post request, is completed at the target interface. Requests that were not completed at the source interface before. In this way, the source of the request directly perceives (through completion of the request) that the request has been completed at the target. In general, the different non-post-request packets do not have logical / contractual conflicts with each other, because up to When the end point is reached (that is, the execution goal), there is no order in between. Therefore, Non-post-request packets can be included in a virtual channel. In the exemplary embodiment, post- and non-post-request packets belong to separate virtual channels to provide compatibility with certain input / output (or peripheral) bus protocols. For example, peripheral parts The connection interface (PCI) confluence interface provides writing after the interface. For operations that originate from PCI, the following sequence rules are required by PCI: (i) writing from the same source still maintains the order on the target interface, (ii) thereafter Followed by reading from the same source and writing after reading, the national standard (CNS) A4 specification ⑵Q χ Norwegian ^ ^ ~~~ — binding ---------. (Please read the precautions on the back before filling out this page) Printed by the Employees' Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 521189 V. Description of the invention (25) Completed on the target interface before the materials are returned; (iii) Non-post-write can not exceed Write from the same source later; and (W) Post-write needs to allow past non-post requests. Requirement (1) is achieved by placing a request to order the virtual channel afterwards (and therefore it is still scheduled to a specific goal) and certain restrictions imposed by the main bridge (see Figure 28). Requirements (ii) and (iii) are logical conflicts between the post-request channel and the non-post-command channel on a non-coordinated structure. Additional details on logical conflicts over uncoordinated links are provided below. The current writing is restricted to the main bridge by implementing some two, and is transmitted from the uncoordinated connection to the coordinated connection. The requirements (η) and (iH) can be achieved (see Figure 28). The request (lv) can be achieved by providing individual post-order, non-post-order, and replying to the virtual channel. Later and non-post requests can result in the generation of probe request packets (to maintain coherence in the coordination structure) and response packets (to transfer data and provide confirmation of execution). Therefore, the probing packet and the reply packet are not included in the same virtual channel after the false positives and negatives (to avoid deadlock due to resource conflicts and logical conflicts). Furthermore, a probe packet can cause a probe response and a read response packet to be generated, and therefore the response packet is placed in a separate virtual channel. Reply packets can also generate additional reply packets (for example, __ and Talk_ can generate each other). Therefore, reply packets may conflict with other reply packets logically, if all reply packets are assigned to the same virtual channel. However, dispatching reply packets to several different virtual channels is undesirable because it increases resource requirements (for example, buffer storage) to handle additional virtual channels. It should be noted that the reply packet is the result of requesting ^ to Pakistan (later or non-later), directly or indirectly (such as through the investigation that produces the packet with ___ 乂 覆)

‘紙張尺度適用中國國家標準(C'NS)A4規格(210 X 91890 -----------裝--------訂--------- (請先閱讀背面之注意事項再填寫本頁) ^21189 經濟部智慧財產局員工消費合作社印製 A7 ------------------- 五、發明酬(26) ' 因此,於-個示範具體實施例,節點12至i2D(及下列顯 不之I/O節點)可設定為,於起始具後或非後請求封包之執 行前,分配足夠資源以處理用於答㈣執行時任何傳送之 =覆封包(包含任何答覆資料封包)。相似地,於產生探查 請求封包前,一個節點可設定為分配足夠資源以處理探查 各覆封包(若答覆封包將返回至該節點)。由於此預先分配 資源’可避免邏輯衝突且所有答覆封包可由處理節點所接 收。因此’答覆封包可合併至所有答覆封包(與對應資料封 包)可行進之答覆虛擬通道。 探查答覆封包於探查虛擬通道裡行進。探查用以維持 記憶體位置之不同快速緩衝儲存區副本與記憶體位置本身 間之連貫。對應於一個將由記憶體控制器處裡之第一請求 封包之連貫行動可此需於隨後請求封包處理前完成。例 如,若記憶體控制器之序列充滿關於相同快速緩衝儲存區 區塊之請求,於記憶體控制器將不會產生額外請求封包之 處理,直到第一請求完成。因此,探查請求封包可分派至 分離虛擬通道以確保與其他虚擬通道裡封包之資源衝突不 會阻隔探查請求封包。 表格42亦指示支持各型虚擬通道之通訊連接(例如, 協調或非協調)之類型。例如,非協調與協調連接皆支持後 命令、非後命令、與答覆虛擬通道。然而,因探查請求封 包用以確保協調與非協調聯繫不支持連貫,一個非連接將 不會作為探查虛擬通道。 虛擬通道一協調結椹 ------------裝--------訂i (請先閱讀背面之注意事項再填寫本頁) # 本紙張尺度適用中國國家標準(CNS)A4規格(210 x 297公釐) 26 91890 521189 A7 Β7'Paper size applies to China National Standard (C'NS) A4 specification (210 X 91890 ----------- installed -------- order --------- (please (Please read the notes on the back before filling this page) ^ 21189 Printed A7 by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs ------------------- V. Invention Pay (26) 'Therefore, in an exemplary embodiment, nodes 12 to i2D (and the following I / O nodes that are not shown) can be set to allocate sufficient resources for processing after the initial or non-post request packet is executed. Any response sent during the execution of the response = reply packet (including any reply data packet). Similarly, before generating a probe request packet, a node can be set to allocate sufficient resources to process each probe packet (if the reply packet will return to (The node). Because this pre-allocated resource 'can avoid logical conflicts and all response packets can be received by the processing node. Therefore, the' response packets can be merged into all the response virtual channels where the response packets (and corresponding data packets) are feasible. Probe the response packets Proceed in the probing virtual channel. Probing is used to maintain differences in memory locations The coherence between the cache buffer copy and the memory location itself. A coherent action corresponding to the first requested packet to be processed by the memory controller can be done before the subsequent request packet is processed. For example, if the memory controller The sequence is full of requests for the same cache area. The memory controller will not generate additional request packets until the first request is completed. Therefore, the probe request packets can be dispatched to separate virtual channels to ensure that they are separated from other virtual channels. The resource conflict of packets in the channel will not block the probe request packet. Table 42 also indicates the types of communication connections (such as coordinated or uncoordinated) that support various types of virtual channels. For example, both uncoordinated and coordinated connections support post-command, non-post- Command, and reply to the virtual channel. However, because the probe request packet is used to ensure that the coordination and non-coordination links do not support coherence, a non-connection will not be used as the probe virtual channel. ---- Install -------- Order i (Please read the precautions on the back before filling this page) # This paper size applies China National Standard (CNS) A4 (210 x 297 mm) 26 91890 521189 A7 Β7

參照第10圖,顯示示範處理節點12A之 區塊圖示。其他處理銘 >、體實施制 疼理即點12Bi 12D可以相似 再者,處理節點12a 5 々甘儿 飞叹又。 it队雄 至12D之其他具體實施例為可能^ 慮。於第10圖之且鲈奢谂加. π』此與考 輯18A、18B、蛊β々陡麻仏 匕3界面瑪 咏 ” 18C及记憶體控制器16A。此外, 郎點12A包含處理獎> & 卜處理 w核心52與快速緩衝儲存區 處理邏輯58、及選擇性地包含第二處理 〇封包 快速緩衝儲存區54。異 入 第二 界面邏輯18A至18C連接至封包 理邏輯58。處理器桉、 了匕處 ^ r ' 52與%分別連接至快速緩衝 :〇與54。快速緩衝儲存區⑼與54連接至封包處理^ 封包處理邏輯58連接至記憶體控制器16A。 大體而言,封包處理邏輯58配置為答覆處理節點 2連接之連接上所接收之請求封包,以回應由快速緩衝餘 子區50與54及/或處理器核心η*%來之請求而產生請 求封包,並且回應由記憶體控制器16八選擇服務之執行而Referring to Figure 10, a block diagram of an exemplary processing node 12A is shown. Other processing inscriptions > System implementation The point of view 12Bi 12D can be similar. Furthermore, the processing node 12a 5 々GAN Er sighs again. It is possible that other specific embodiments of the IT team to 12D are considered. In Figure 10, the extravagant perch is added. Π "This is in conjunction with the review series 18A, 18B, 蛊 β々 steep mochi 3 interface Ma Yong" 18C and memory controller 16A. In addition, Lang point 12A includes processing award > The processing core 52 and the cache processing logic 58 and optionally include the second processing 0 packet cache 54. The second interface logic 18A to 18C is connected to the packet management logic 58. The processor and processor ^ r '52 and% are connected to the fast buffer: 0 and 54. The fast buffer storage areas ⑼ and 54 are connected to the packet processing ^ The packet processing logic 58 is connected to the memory controller 16A. Generally speaking The packet processing logic 58 is configured to respond to the request packet received on the connection connected by the processing node 2 in response to a request from the fast buffer sub-regions 50 and 54 and / or the processor core η *% to generate a request packet, and In response to the execution of the service selected by the memory controller 16

產生探查請求與答覆封包,並且路由封包,使得節點12A 為至另-界面邏輯18…8C之中間節點’以傳送至另_ 節點。界面邏輯18A、18B、與18C可包含邏輯以接收封 包與同步封包至封包處理邏輯58所使用之内部時脈。 封包處理邏輯58可包含硬體以支持由電腦系統1〇所 支持之虛擬通道之資源獨立。例如,封包處理邏輯58可提 供個別緩衝儲存器於每個虛擬通道,如第丨丨圖所說明。另 一具體實施例可提供硬體以於界面邏輯18A至18C,或任 何適當位置裡’提供虛擬通道之資源獨立。 本紙張尺度適用中國國家標準(CNS)A4規格⑵〇χ 297公爱)----- 27 f請先閱讀背面之注音?事項再填寫本頁) 1叮--------- 經 濟 部 智 慧 財 產 局 員 工 消 費 合 作 社 印 製 91890 經 濟 部 智 慧 財 產 局 員 工 消 費 合 作 社 印 製 A7 B7 五、發明說明(2〇 快速緩衝儲存區5〇與54包含高速快速緩衝儲存區記 憶體,配置為儲存快速緩衝儲存區區塊之資料。快速緩衝 儲存區50與54可結合於個別處理器核心52與56裡。或 者,快速緩衝儲存區50與54可依要求,以一個後方快速 緩衝儲存區結構,或一個同轴結構,連接至處理器核心52 與56。更進一步,快速緩衝儲存區50與54可以一個快速 緩衝儲存區體系施行。若需要,可將較鄰近處理器核心52 、5 6之快速緩衝健存區可結合至處理器核心$ 2與$ 6裡 (於快速緩衝儲存區體系裡)。 處理器核心52與56包含電路以根據一組預先定義指 令執行指令。例如,可選擇χ86指令組結構。或者,可選 擇Alpha、P0werPC、或任何其他指令組結構。大體而言, 處理器核心存取快速緩衝儲存區之資料及指令。若偵測到 快速緩衝儲存區遺漏,將產生讀取請求且傳送至遺漏快速 緩衝儲存區區塊所映圖之節點裡之記憶體控制器。 參照第11圖,顯示封包處理邏輯58之示範具體實施 例區塊圖示。其他具體實施例為可能並予考慮。於第j i 圖之具體實施例,封包處理邏輯58包含第一組命令與資料 封包緩衝儲存器60、第二組命令與資料封包緩衝儲存器 62、第三組命令與資料封包緩衝儲存器64、控制邏輯66、 資料緩衝儲存器槽68、與答覆計數器槽70。命令與資料封 包緩衝儲存器60包含後命令緩衝儲存器(PCB)60A、非後 命令緩衝儲存器(NPCB)60B、答覆緩衝儲存器(RB)6〇c、探 查緩衝儲存器(PB)60D、後命令資料緩衝儲存器 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) " ----- 28 Si 890 --------------------訂--------- (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 521189 A7 B7 五、發明說明(29) (PCDB)60E、非後命令資料緩衝儲存器(NPCDB)60F、及答 覆資料緩衝儲存器(RDB)60G。 相似地,命令與資料封包緩衝儲存器62包含後命令 緩衝儲存器(PCB)62 A、非後命令緩衝儲存器(NPCB)62B、 答覆緩衝儲存器(RB)62C、探查緩衝儲存器(PB)62D、後命 令資料緩衝儲存器(PCDB)62E、非後命令資料緩衝儲存器 (NPCDB)62F、及答覆資料緩衝儲存器(RDB)62G。命令與 資料封包緩衝儲存器 64 包含後命令緩衝儲存器 (PCB)64A、非後命令緩衝儲存器(NPCB)64B、答覆緩衝儲 存器(RB)64C、探查緩衝儲存器(PB)64D、後命令資料緩衝 儲存器(PCDB)64E、非後命令資料緩衝儲存器 (NPCDB)64F、及答覆資料緩衝儲存器(RDB)64G。命令與 資料封包緩衝儲存器60連接至接收由界面邏輯18A接收 之封包(例如,於線路24B)。相似地,命令與資料封包緩 衝儲存器62連接至接收由界面邏輯18B接收之封包,且 命令與資料封包緩衝儲存器64連接至接收由界面邏輯 18C接收之封包。命令與資料封包緩衝儲存器60、62、與 64連接至控制邏輯66。 此外,答覆資料緩衝儲存器60G、62G、與64G連接 至資料緩衝儲存器槽68。資料緩衝儲存器槽68與答覆計 數器槽70連接至控制邏輯66,其更進一步地包含一個節 點ID暫存器72、命令封包主動暫存器74 A至74C、與資 料封包主動暫存器76A至76C。控制邏輯66經由接收與 傳送界面連接至界面1 8A至1 8C,且亦連接至記憶體控制 --I--111111AW -------I 訂·-------- (請先閱讀背面之注意事項再填寫本頁) 本紙張尺度適用中國國家標準(CNS)A4規格(210x 297公釐) 29 91890 521189 經濟部智慧財產局員工消費合作社印製 30 A7 五、發明說明(3〇 ) 器16A與快速緩衝儲存區5〇(及選擇性之快 外資料緩衝儲存器槽68更進-步地連接至記== 盗16A與快速緩衝儲存區5〇(及選擇性之快速緩衝儲存區 54) 〇 每組命令與資料封包緩衝儲存器對於每個虛擬通道 提供不同緩衝儲存器。例如,於本具體實施例,後命令缓 衝儲存器60A可分派至後命令虛擬通道,非後命令緩衝儲 存器60B可分派至非後命令虛擬通道,答覆緩衝儲存器 60C可分派至答覆虛擬通道,及探查緩衝儲存器可分 派至探查虛擬通道。α此方式,於一個虛擬通道接收封包 將不會被另一虛擬通道裡接收封包所阻礙。由每個虛擬通 道來之封包可儲存於對應該虛擬通道之命令封包緩衝儲存 器,且因此不會實際上與由另一虛擬通道接收之封包衝突 (其儲存於一個不同命令封包緩衝儲存器)。緩衝儲存器Μ 與64裡相似命名之緩衝儲存器可分派至如上述之虛擬通 道。 相似地,資料封包緩衝儲存器提供於攜帶資料封包之 每個虛擬通道。於一個示範具體實施例,探查虛擬通道可 能不攜帶資料封包。例如,後命令資料緩衝儲存器可 分派至後命令虛擬通道,非後命令資料緩衝儲存器6〇卩可 分派至非後命令資料虛擬通道,及答覆資料緩衝儲存器 60G可分派至答覆虛擬通道。緩衝儲存器62與64裡相似 命名之緩衝儲存器可分派至如上述之虛擬通道。 於本具體實施例,界面邏輯丨8A至〗8C配置為劃分接 Μ氏張尺度適用中國,標準(CNS)A4規格⑵G x 29 91890 AW ^--------訂— (請先閱讀背面之注意事項再填寫本頁) # 521189 經濟部智慧財產局員工消費合作社印製 31 A7 五、發明說明(31) ,之封包至控制路徑上提供之封包,與資料路徑上提供之 貝料封包。控制路徑連接至命令 八 衝儲存器60A至咖由界面^ Μ㈣存器(例如,緩 由界面邏輯18Α連接至控制 且貧料途控連接至資料封包緩衝儲存器(例如 ㈣ _至6〇〇由界面邏輯18Α連接至資料途徑)。::= 66配置為經由接收與傳送界面接收封包類型之指示 -步地配置為分配緩衝儲存器項目於所接收之封包 他考慮之具體實施例,接收之封包不為界面邏分: ,㈣具體實施例,控制邏輯66可接收控制(ctl)信號以 區別貝料之位7G時間與控制資訊之位元時間。 大體而言,控制邏輯66可配置為處理由不同緩衝儲 存盗來,.且保持於其他緩衝儲存器之封包無關之封包。因 此,將可避免行進於不同虛擬通道間之封包之實際衝突。 於一個示範具體實施例’控制邏輯66檢查命令封包 緩衝儲存器60、62、與64裡之封包以判定封包指定至節 點12ΑΓ該節點")或將轉送至另一節點。節點ι〇暫存器a 儲存"該節點"之節點ID,且㈣邏輯66將執行關於節點 E,之比較’以判定封包是否指定至”該節點,、需注意的 疋’於本具體實施例,於探查虛擬通道裡之封包為廣播封 包,且因此指定至”該節點"與"該節點"將傳送封包之1他 節點。因此,控制邏輯66可省略於探查虛擬通道上所接收 之封包節’點ID比較。然而,除了探查虛擬通道外,虛擬 通道裡之封包為指向封包,其中封包之終點節點領域辨識 封包是否指定至該節•點,或將轉送至另一節點。因此,控 谢關家標準(CNi^F(_21Q χ 29 91890Generate a probe request and reply packet, and route the packet so that node 12A is an intermediate node to another-interface logic 18 ... 8C for transmission to another node. The interface logic 18A, 18B, and 18C may include logic to receive packets and synchronize the packets to the internal clock used by the packet processing logic 58. The packet processing logic 58 may include hardware to support resource independence of the virtual channels supported by the computer system 10. For example, the packet processing logic 58 may provide an individual buffer memory for each virtual channel, as illustrated in the figure. Another embodiment may provide hardware to provide resource independence of the virtual channel in the interface logic 18A to 18C, or any appropriate location. This paper size is in accordance with Chinese National Standard (CNS) A4 specification (⑵〇χ 297 公 爱) ----- 27 f Please read the note on the back first? Please fill in this page for more details) 1 Ding --------- Printed by the Employees 'Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 91890 Printed by the Employees' Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7 Areas 50 and 54 contain cache memory, which is configured to store data in cache areas. The cache areas 50 and 54 can be combined into individual processor cores 52 and 56. Alternatively, the cache areas 50 and 54 can be connected to the processor cores 52 and 56 by a rear cache area structure or a coaxial structure upon request. Furthermore, the cache areas 50 and 54 can be implemented by a cache area system. If needed, the fast buffer memory areas adjacent to processor cores 52, 56 can be combined into processor cores $ 2 and $ 6 (in the cache memory system). Processor cores 52 and 56 contain circuits To execute instructions based on a set of predefined instructions. For example, the x86 instruction group structure can be selected. Alternatively, Alpha, PowerPC, or any other instruction can be selected Order structure. In general, the processor core accesses the data and instructions of the cache. If a cache miss is detected, a read request will be generated and sent to the map of the missing cache block. The memory controller in the node. Referring to FIG. 11, a block diagram of an exemplary embodiment of the packet processing logic 58 is shown. Other specific embodiments are possible and considered. In the specific embodiment of FIG. Ji, the packet processing logic 58 includes a first set of command and data packet buffer memory 60, a second set of command and data packet buffer memory 62, a third set of command and data packet buffer memory 64, control logic 66, data buffer memory slot 68, and Reply counter slot 70. The command and data packet buffer memory 60 includes a back command buffer memory (PCB) 60A, a non-post command buffer memory (NPCB) 60B, a reply buffer memory (RB) 60c, and a probe buffer memory. (PB) 60D, post-command data buffer memory This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) " ----- 28 Si 890 ---------- ---- ------ Order --------- (Please read the precautions on the back before filling out this page) Printed by the Intellectual Property Bureau of the Ministry of Economic Affairs Employee Cooperatives 521189 A7 B7 V. Invention Description (29) ( PCDB) 60E, non-post command data buffer memory (NPCDB) 60F, and reply data buffer memory (RDB) 60G. Similarly, the command and data packet buffer memory 62 includes a post command buffer memory (PCB) 62 A, Non-post-command buffer memory (NPCB) 62B, response buffer memory (RB) 62C, probe buffer memory (PB) 62D, post-command data buffer memory (PCDB) 62E, non-post-command data buffer memory (NPCDB) 62F, and response data buffer memory (RDB) 62G. Command and data packet buffer memory 64 includes post-command buffer memory (PCB) 64A, non-post-command buffer memory (NPCB) 64B, reply buffer memory (RB) 64C, probe buffer memory (PB) 64D, post-command Data buffer memory (PCDB) 64E, non-post-command data buffer memory (NPCDB) 64F, and reply data buffer memory (RDB) 64G. The command and data packet buffer memory 60 is connected to receive packets received by the interface logic 18A (e.g., on line 24B). Similarly, the command and data packet buffer memory 62 is connected to receive packets received by the interface logic 18B, and the command and data packet buffer memory 64 is connected to receive packets received by the interface logic 18C. Command and data packet buffers 60, 62, and 64 are connected to control logic 66. In addition, the reply data buffer memories 60G, 62G, and 64G are connected to the data buffer memory slot 68. The data buffer memory slot 68 and the response counter slot 70 are connected to the control logic 66, which further includes a node ID register 72, a command packet active register 74 A to 74C, and a data packet active register 76A to 76C. The control logic 66 is connected to the interfaces 1 8A to 18C via the receiving and transmitting interface, and is also connected to the memory control --I--111111AW ------- I order (Please read the notes on the back before filling this page) This paper size applies to China National Standard (CNS) A4 (210x 297 mm) 29 91890 521189 Printed by the Consumers ’Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 30 A7 V. Invention Description (3 〇) 16A and fast buffer storage area 50 (and optional fast external data buffer storage slot 68 is further connected to the record == Pirate 16A and fast buffer storage area 50 (and selective fast buffer Storage area 54) 〇 Each set of command and data packet buffer storage provides different buffer storage for each virtual channel. For example, in this embodiment, the post-command buffer storage 60A can be assigned to the post-command virtual channel, not the post-command. The command buffer memory 60B can be assigned to a non-post-command virtual channel, the reply buffer memory 60C can be assigned to a reply virtual channel, and the probe buffer memory can be assigned to a probe virtual channel. Α In this way, receiving packets on a virtual channel will not Will be Reception of packets in one virtual channel is hindered. Packets from each virtual channel can be stored in the command packet buffer memory corresponding to the virtual channel, and therefore will not actually conflict with packets received by another virtual channel (its storage In a different command packet buffer memory). Buffer memory M and 64 similarly named buffer memory can be assigned to the virtual channel as described above. Similarly, the data packet buffer memory is provided for each virtual channel carrying a data packet. In an exemplary embodiment, the probe virtual channel may not carry data packets. For example, the post-command data buffer memory may be assigned to the post-command virtual channel, and the non-post-command data buffer memory 60 may be assigned to non-post-command data. The virtual channel and the response data buffer storage 60G can be assigned to the response virtual channel. Buffer storages similarly named in the buffer memories 62 and 64 can be assigned to the virtual channels as described above. In this specific embodiment, the interface logic 丨 8A to 〖8C is configured to be divided into M's scales applicable to China, standard (CNS) A4 specifications⑵G x 29 91890 AW ^ -------- Order— (Please read the notes on the back before filling this page) # 521189 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 31 A7 V. Description of the Invention (31) The packet provided on the control path and the shell material packet provided on the data path. The control path is connected to the command eight punch storage 60A to the coffee interface ^ Μ㈣ memory (for example, the interface logic 18Α is connected to the control and is out of date). The controller is connected to the data packet buffer storage (for example, ㈣ _ to 600, which is connected to the data channel by the interface logic 18A). :: = 66 is configured to receive the indication of the packet type via the receiving and transmitting interface-step by step is configured to allocate buffer storage The specific embodiment that the receiver item considers in the received packet, the received packet is not an interface logic: In the specific embodiment, the control logic 66 can receive a control (ctl) signal to distinguish the 7G time of the shell material and the control information. Bit time. Generally speaking, the control logic 66 may be configured to handle packets that are stolen from different buffer storages and are unrelated to packets held in other buffer storages. Therefore, actual collisions of packets traveling between different virtual channels will be avoided. In an exemplary embodiment, the control logic 66 checks the packets in the command packet buffers 60, 62, and 64 to determine whether the packet is assigned to the node 12 (the node ") or forwards it to another node. The node ID register a stores the node ID of "the node", and the logic 66 will perform a comparison on the node E to determine whether the packet is assigned to "the node, which needs to be noted" in this specific In the embodiment, the packet in the probe virtual channel is a broadcast packet, and is therefore designated to "this node" and "this node" will transmit the other node of the packet. Therefore, the control logic 66 may omit the comparison of the point ID's of the packet nodes received on the probe virtual channel. However, in addition to exploring the virtual channel, the packet in the virtual channel is a directed packet, where the end node field of the packet identifies whether the packet is specified to the node or point or will be forwarded to another node. Therefore, thanks to the Guan Family Standard (CNi ^ F (_21Q χ 29 91890

Aw ^--------- (請先閱讀背面之注意事項再填寫本頁) 五、發明說明(32 制邏輯“可對此類封包執行節點ID比較。 控制邏輯66可包含一個或多個路由表格 對於每個終點節點,那摘臾工p + /、相不, 即^那個界面邏輯18A至18c可用 廣播封包或指定至1他M κ e t ^ 州从轉逐 一 、他即點之封包。控制邏輯66可 包,當接收經由已辨1 I 、子 ^ ㈣識界面避輯18A1㈣傳送之封 接收卽點,具閒置命今抖6 匕之 置卩Y封包緩衝儲存器於封包所分 擬通道。此外,若封包且鰣社― 刀辰之虛 封匕具體指定一個資料封包,則於控制 邏輯66轉送封包盎且㉟如〜 】 丁匕/…、體才曰疋之資料封包前,控制邏 確说對於封包所分派之卢撼、s 一 虛擬通暹之貧料封包緩衝儲存器可 利用性。若控制邏輯66判定封包(及資料封包,若 定)將轉送且確認適當封包缕榭 八知 衝儲存器之可利用性,則控制 邏輯接者使用接收與傳送界面,轉送封包至已辨識之界面 邏輯18A至18c。界面邏輯18A至18c隨後接著轉送封包 至接收節點。此外,控制邏輯66注意到對應類型之緩衝储 存器已釋放(因為封包與資料封包,若具體指定,已轉送)。 一個資訊封包可接著經由適當界面18A至i8c傳送以通知 接收末端之節點緩衝儲存器之可利用性。 消 乂而右封包指疋至”該節點",則控制邏輯66接著根 據封包類型處理封包。例如,若封包為一個對準於記憶體 控制器16A之寫入請求,則控制邏輯“試圖傳遞寫入請 求封包至記憶體控制器16A。舉例而言’若序列額滿,則 記憶體控制器16A可使用序列於欲處理之執行,且可拒與 寫入請求封包。若接收之封包為一個探查請求封包,則指 I制邏輯66可與快區50及54(及任何處理器杉 尺度適用中關家標準(CNS)A4規格(210 X 297公爱) 521189 經 濟 部 智 慧 財 產 局 員 工 消 費 合 作 社 印 製 91890 A7 五、發明說明(33) 心52與56内之快速緩衝儲存區)通訊,以判定由探查定 址之快速緩衝錯存區區塊狀態。控制邏輯66可接著藉由產 生報告定址之快速緩衝儲存區區塊狀態之探查答覆封包回 應探查(或一個具資料之讀取答覆封包,若快速緩衝儲存區 區塊已被修改),並接著傳送探查答覆封包,若接收節點已 指示適當封包緩衝儲存器之可利用性。 除了處理接收之封包,控制邏輯66可產生封包以回 應由快速緩衝儲存區50及54來之填入請求與犧牲區塊, 及回應直接由處理器核心52與56來之請求之封包(例 如,不可快取請求,I/O請求等)。更進一步,可產生答覆 封包以回應提供傳送之資料或完成執行之記憶體控制器。 若接收節點緩衝儲存器可取得,則控制邏輯66可產生探查 請求封包以回應選擇對應請求來處理之記憶體控制器 1 6 A,及可廣播探查請求封包。 如上述,一個節點分配足夠資源以處理所接收之答覆 封包,回應由該節點傳送之請求封包。於—個示範具體實 施例,控制邏輯66可傳送封包,將使答覆封包以兩種方式 送回節點:⑴當產生請求封包以起始執行(例如,回應由 快速緩衝儲存區50與54或處理器核心52與56來之請 求)’及(η)當對於對準記憶體控制器i 6A之請求封包產生 探查請求封包。更具體地,方式⑻可能發生 控一之定大小寫入。於任一方式,控制邏準輯: 配資源以提供接收與處理答覆封包。 _ & —範具體實施例,控制邏輯66可由資料緩衝 本紙張尺度適用中國國家標準(CNS)A4規格mo X 297公复) ^--------- (請先閱讀背面之注意事項再填寫本頁) 521189 B7 五、發明說明(34) 儲存器槽68與答覆計數器槽7〇分 答覆。資料緩衝儲在哭Μ ^ '周、以接收與處理 貝㈣衝储存器槽68可包含複 之快速緩衝儲存區區塊,而答覆計數⑼ 二儲存貧料 計數器。-個資料緩衝儲存器槽項目二含複數個 執行之答覆資料。-個計數器可乂刀配以儲存對應於 保留將於探查答覆提供之任何狀;資:答覆並 分配之計數器計算(例如,直到達到預期之:覆數?)使: 所接收之具答覆封包之資料可儲存於分配之衝 器。需注意的是’至多,兩個 《、-衝错存 封” L: 制器來’若Memc_答覆 封包》又有於傳送答覆封包前抵 且杳柢攸并此士 厲體控制斋,且一個由 〃貝科修改快速緩衝料區副本之探 兩個資料封包,則由禊杳銘朴七七 右镬收到 體控制器來之封包將摒棄。 疋隱 根據履行之執行類型…旦接收了每個預期答覆與答 貝科’控制邏輯66即可傳送資料至記憶體控制器16A 或快速緩衝儲存區5()貞54。例如,若答覆為產生用以回 應由封包處理邏輯58所產生之探查請求之探查答覆,答覆 貧料將傳送至記憶體控制器16A。或者,若答覆乃由於讀 取執灯產生’則資料可傳送至快速緩衝儲存區50與54。 消 舄注思的疋資料緩衝儲存器槽68亦可用以儲存欲由 蟥點12 A傳送之資料。例如,對於由節點〗2 a產生之寫入 喷求犧牲區塊資料或寫入資料將儲存於資料緩衝儲存器 丨# 68。$ # ’對於此類資料將提供個別緩衝儲存器。再者, 1 本紙張尺度刺織格咖χ 297公爱) 34 91890 521189 經濟部智慧財產局員工消費合作社印製 A7 五、發明說明(35 ) 沒有設有用於不同執行之緩衝儲存器肖,而 行類型個別緩衝儲存器。 母個執 大體而言’如此處所使用,緩衝儲存器為 件用以儲存緩衝儲存器一個或多 子疋 回。緩衝儲存器可包含一個或多個暫存器、鎖存器、= 器’或其他計時儲存裝置。或者,緩衝儲存器可包含適备 女排之-組隨機存取記憶體(RAM)胞。緩衝儲存器割分為 複數個儲存位置,每個儲存位置配置㈣存緩衝儲存器相 要類型之-個資訊項目。儲存位置可以任何適當方式分配 與取消分配。例如’緩衝儲存器可操作為轉移先進先出緩 衝儲存器(FIFO),其中當較舊項目刪除時,儲存項目之位 置向下轉移。或者,則端與末端指示物可用以指示缓衝儲 存器裡最舊與最新之項目位置,且項目可仍舊於緩衝儲存 器一個特定儲存位置直到由其刪除。如此處使用之名稱” 控制邏輯",乃關於組合性邏輯之任何組合及/或於輸入執 行操作並產生輪出以回應所述操作之完成之狀態機。 於一個示範具體實施例,封包由界面邏輯i 8A至1 8C 以一連串位元時間接收。界面邏輯18A至18c指示命令或 資料位元時間是否傳送,且控制邏輯66使得適當緩衝儲存 器儲存位元時間。控制邏輯66可使用命令封包主動(CPA) 暫存器74與資料封包主動(DPA)暫存器76以辨識正在接 收之封包分派至那個虛擬通道。一個CPA暫存器74提供 於每個界面邏輯18A至18C(例如,CPA 74A對應於界面 1 8A)。相似地,一假DPA暫存器76提供於每個界面邏輯 -----------«裝--------訂---------^ρ· (請先閱讀背面之注意事項再填寫本頁) 本紙張尺度適用中國國家標準(cns)a4規格(210 x 297公釐) 35 91890 521189 智 慧 財 員 工 消 費 A7 五、發明說明(36) 18A至18C(例如’ DpA76A對應於界面i8A卜 因此,於—個示範具體實施例,回應所 一位元時間,控制玀醅^初 封匕之第 邏輯66解碼命令領域(其於 並判定所接收封包分派$那相南π 兀時間1) 刀派至那個虛擬通道。控制邏輯6 緩衝儲存器位置於針靡人人 刀配 直於對應命令封包緩衝儲存 接收封包之界面邏輯18A 5 、、 、、且對應 聲铒至18C裡)並設定cpA暫存 之狀態,其對應接收抖七*田 ^ 15 76 镬收封包之界面邏輯18A至18C,以&一 該命令封包緩衝儲存器位置之分派。由相同界面邏輯;: 至18c來之隨後封包位元時間儲存於指示緩衝儲存器 直:接收到封包每個位元時間。相似地,若“ 具體t疋資料封包’則控制邏輯66分配資料封包緩衝 儲存位置於對應辨均夕由Μ ^ …辨識之虛擬通道之資料封包緩衝儲存 器。貧料封包位元時間儲存於指示緩衝館存器之指示位 置,直到接收到封包每個位元時間。 於另一具體實施例,界面邏輯18Α至18c可收集封包 之位元時間且接著傳送整個封包至封包處理邏輯58。於此 具體實施例’CPA暫存器74與舰暫存器%可消除。於 另一具體實施例’界面邏輯18A至度可收集數個位 間以同時傳送至封包處理邏輯58,但位元時間之數目將少 於一個封包。於另一具體實施例,緩衝儲存器6〇、62、盥 64可位於個別界面邏輯18A至18C而非於封包處理邏輯 58内。 第11圖所顯示之具體實施例提供個別緩衝儲存器組 ,於每個界面邏輯18人至18C。於另一具體實施例,緩衝儲 本紙張尺度刺中_家標準(CNS)A4規格⑵0x297公爱)---- 36 91890 ^--------^--------- ί請先閱讀背面之注意事項再填寫本頁)Aw ^ --------- (Please read the notes on the back before filling out this page) 5. Description of the invention (32 system logic "can perform node ID comparison on such packets. Control logic 66 may include one or Multiple routing tables. For each destination node, the workers p + /, not the same, that is, the interface logic 18A to 18c can be broadcast packets or designated to 1 other M κ et ^ state from turn to turn one by one. Packet. The control logic 66 can be packeted. When receiving the received packet received via the identified 1 I, sub ^^ interface, 18A1, it will be idle, and the packet will be stored in the packet buffer memory. In addition, if the packet and the company—Daochen ’s virtual envelope specifically specifies a data packet, then the control logic 66 forwards the packet and the sequence is as follows:】 Ding / ..., Ti Caiyue ’s data packet, control The logic does say that for the allocated packet buffer, the s-virtual packet buffer storage availability of the virtual packet. If the control logic 66 determines that the packet (and the data packet, if determined) will be forwarded and confirm the appropriate packet. Know the availability of flush storage, then control The logical receiver uses the receiving and transmitting interface to forward the packet to the identified interface logic 18A to 18c. The interface logic 18A to 18c then forwards the packet to the receiving node. In addition, the control logic 66 notices that the corresponding type of buffer memory has been released ( Because packets and data packets are forwarded if specifically specified). An information packet can then be transmitted via the appropriate interfaces 18A to i8c to notify the availability of node buffer storage at the receiving end. Then the right packet refers to "the" Node ", the control logic 66 then processes the packet according to the packet type. For example, if the packet is a write request directed to the memory controller 16A, the control logic "attempts to pass the write request packet to the memory controller 16A . For example, 'If the sequence is full, the memory controller 16A can use the sequence to execute the processing and can reject the write request packet. If the received packet is a probe request packet, it means I logic 66 Compatible with Fast Zones 50 and 54 (and any processor Shan scale applicable to Zhongguanjia Standard (CNS) A4 specifications (210 X 297 public love) 521189 Ministry of Economic Affairs Printed by the Intellectual Property Bureau's Consumer Co-operative Society 91890 A7 V. Description of Invention (33) Quick buffer storage areas in cores 52 and 56) to determine the status of the fast buffer misstore area blocks that are located by probing. The control logic 66 can then borrow Generate a probe response to the status of the cached block area of the report address response packet (or a read response packet with data, if the cached block has been modified), and then send a probe response packet if the receiving node has Indicate the availability of appropriate packet buffer memory. In addition to processing received packets, control logic 66 can generate packets in response to fill requests and sacrifice blocks from fast buffer storage areas 50 and 54, and the response is directly from the processor core Packets for requests from 52 and 56 (eg, non-cacheable requests, I / O requests, etc.). Furthermore, a reply packet can be generated in response to the memory controller providing the transmitted data or completing the execution. If the receiving node buffer memory is available, the control logic 66 may generate a probe request packet in response to the memory controller 16 A which selects the corresponding request for processing, and may broadcast the probe request packet. As mentioned above, a node allocates sufficient resources to process the received reply packet, and responds to the request packet transmitted by the node. In an exemplary embodiment, the control logic 66 may transmit the packet, which will cause the reply packet to be sent back to the node in two ways: when a request packet is generated for initial execution (for example, the response is processed by the fast buffer storage areas 50 and 54 or processed) Requests from the processor cores 52 and 56) 'and (η) when a probe request packet is generated for a request packet directed to the memory controller i 6A. More specifically, mode ⑻ may occur in a fixed-size write. In either way, control logic: allocate resources to provide receiving and processing reply packets. _ & —Specific embodiment, the control logic 66 can be buffered by the data. The paper size applies the Chinese National Standard (CNS) A4 specification mo X 297 public copy. ^ --------- (Please read the note on the back first Please fill in this page again for details) 521189 B7 V. Description of the invention (34) The memory slot 68 and the reply counter slot 70 minutes to reply. The data buffer is stored in the memory for receiving and processing. The buffer storage tank 68 may include a block of a fast buffer storage area, and the response count is a second storage lean counter. The second data buffer memory slot item contains a plurality of response data for execution. -A counter can be equipped with a knife to store any status corresponding to the reservation to be provided in the probe reply; data: counter calculations assigned to the reply and assigned (for example, until the expected one: the number of responses?) Enables: the number of received reply packets Data can be stored in the assigned punch. It should be noted that 'at most, two ",-red wrong storage seal" L: The controller came' if Memc_ reply packet 'also arrived before the reply packet was sent, and this sturdy body control fast, and An exploration of two data packets of a copy of the fast buffer area by 〃Beco, will be discarded by 禊 杳 明 朴 七七 右 镬 received from the body controller. 疋 Yin according to the type of implementation ... once received Each prospective response and Abeco 'control logic 66 can send data to the memory controller 16A or the fast buffer area 5 ()-54. For example, if the response is generated in response to a response generated by the packet processing logic 58 The probe reply to the probe request will be sent to the memory controller 16A. Or, if the reply is generated by reading the lamp, the data can be transferred to the fast buffer storage areas 50 and 54. The buffer storage slot 68 can also be used to store data to be transmitted by the node 12 A. For example, for the write-sacrifice block data generated by the node 2a or the written data will be stored in the data buffer storage 丨 # 68. $ # 'for this Individual data will be provided for individual buffer storage. In addition, 1 paper size woven card coffee 297 (Public Love) 34 91890 521189 Printed by the Consumers ’Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 5. The invention description (35) is not provided for Different implementations of the buffer memory, while the line type of individual buffer memory. Generally speaking, as used herein, a buffer memory is a piece of buffer memory used to store one or more sub-returns. The buffer memory may contain One or more registers, latches, registers, or other timing storage devices. Alternatively, the buffer storage may include a set of random access memory (RAM) cells for the women's volleyball team. The buffer storage is divided into A plurality of storage locations, each storage location is configured with an information item of a corresponding type of buffer storage. The storage location can be allocated and unassigned in any suitable way. For example, 'buffer storage can be operated to transfer a FIFO buffer storage (FIFO), where older items are deleted, the location of the stored item is shifted down. Alternatively, end and end counters can be used to indicate buffer storage The oldest and newest item location, and the item can remain in a specific storage location in the buffer memory until deleted. The name "control logic" as used herein refers to any combination of combinatorial logic and / or executed on input Operate and generate a state machine that rotates in response to completion of the operation. In an exemplary embodiment, the packets are received by the interface logic i 8A to 18 C in a series of bit times. The interface logic 18A to 18c indicates whether the command or data bit time is transmitted, and the control logic 66 causes the appropriate buffer memory to store the bit time. The control logic 66 may use a command packet active (CPA) register 74 and a data packet active (DPA) register 76 to identify which virtual channel a receiving packet is assigned to. A CPA register 74 is provided for each interface logic 18A to 18C (for example, CPA 74A corresponds to interface 18A). Similarly, a fake DPA register 76 is provided for each interface logic ----------- «install -------- order --------- ^ ρ · (Please read the precautions on the back before filling out this page) This paper size applies the Chinese national standard (cns) a4 specification (210 x 297 mm) 35 91890 521189 Smart money employee consumption A7 V. Description of invention (36) 18A to 18C (For example, DpA76A corresponds to the interface i8A. Therefore, in an exemplary embodiment, in response to all the bit time, control the first logical 66 decoding command field (which determines and assigns the received packet to $ That time, the time is 1) The knife is sent to that virtual channel. Control logic 6 The buffer memory is located at the edge of the sword, and is aligned with the corresponding command packet. The buffer logic stores the interface logic 18A 5,,, and the corresponding sound.铒 to 18C) and set the state of cpA temporary storage, which corresponds to receiving jitter seven * field ^ 15 76 镬 The interface logic of receiving packets 18A to 18C, with & a command to assign the packet buffer memory location. From the same interface logic ;: After 18c, the bit time of the subsequent packet is stored in the instruction buffer memory. Straight: Each bit time of the received packet. Similarly, if "specific data packet", the control logic 66 allocates the data packet buffer storage location to the data packet buffer storage corresponding to the virtual channel identified by M ^ ... The lean packet bit time is stored in the instruction The buffer register indicates the position until each bit time of the packet is received. In another embodiment, the interface logic 18A to 18c may collect the bit time of the packet and then send the entire packet to the packet processing logic 58. Here Specific embodiment 'CPA register 74 and ship register% can be eliminated. In another specific embodiment', interface logic 18A can collect several bits to transmit to packet processing logic 58 at the same time, but the bit time The number will be less than one packet. In another embodiment, the buffer memories 60, 62, and 64 may be located in the individual interface logic 18A to 18C instead of the packet processing logic 58. The specific embodiment shown in FIG. 11 Provide individual buffer storage groups, each interface logic 18 people to 18C. In another specific embodiment, the buffer storage paper size puncture _ home standard (CNS) A4 specifications (0x297 public love)- -36 91890 ^ -------- ^ --------- ί Please read the notes on the back before filling in this page)

I 521189 A7 B7 五、發明說明(37) (請先閱讀背面之注咅心事項再填寫本頁) 存器可提供為一個或多個劃分於界面邏輯間之緩衝儲存器 槽(對於每個虛擬通道類型)。於此具體實施例,緩衝儲存 器不需分派至未連接至另一節點之界面邏輯(例如,第1圖 範例之界面邏輯1 8C),使得緩衝儲存器槽之使用效率達到 最大。因此,否則將分配至界面邏輯18c之緩衝儲存器將 分配為界面邏輯18A至18C所使用。 參照第12圖,顯示一個圖示,說明於資料緩衝儲存 器槽68裡之資料緩衝儲存器槽位置之一個具體實施 例。其他具體實施例為可能及考慮。於第12圖之具體實施 例’資料緩衝儲存器槽位置80包含來源標籤領域82、來 源即點領域8 4、來源早元領域8 8、與資料領域$ 6 當控制邏輯66分配資料緩衝儲存器槽位置8〇以儲存 執行之答覆資料封包,控制邏輯66可分別儲存執行之來源 節點、來源單元、與來源標籤於來源節點領域⑷來源單 元領域88 '與來源標籤領域82。因來、、盾狄 ,、 水彝即點、來源單元、 與來源標藏唯一地辨識一個未完成執行,且來源節點 源單元、與來源標籤由對應於該未完成執行之答 經 濟 部 智 慧 財 產 局 員 工 消 費 合 作 社 印 製 攜帶,執行之答覆封包(與對應資料封包 、斤 • 对匕)將由控制邏輯66 所辨識,且資料封包可儲存於分配之 項目。例如,合欠薄 封包具體指定所接收之答覆資料封包,則答覆封包:: 節點、來源單元、與來源標籤將與來源節點領域: 單元領域88、與來源標籤領域82比鲈、 水原 敕》’以判定拿I公 於答覆資料之資料緩衝儲存器槽位置8〇。羑 无刀配 由答覆資料缓衝儲存器副本至分配資::枓接著可 ___ 一 貝针緩衝儲存器槽位置 本紙張尺度適用中國國家標準(CNS)A4規格(210 ----- — 37 91890 521189 經濟部智慧財產局員工消費合作社印製 A7 -------------Β7___ 五、發明說明(38 ) 8〇之貝料領域86。於一個示範具體實施例,資料領域% 可包含資料之快速緩衝儲存區區塊。 〃接著參照第13圖,顯示一個圖示’說明於答覆計數 器槽70裡之答覆计數器9〇之示範具體實施例。其他具體 實施例為可能及考慮。於第13圖之具體實施例,答覆計數 器90包3來源標籤領域92、來源節點領域94、來源單元 領域95、答覆計數領域%、與接收狀態領域卯。 當控制邏輯66分配答覆計數器90以儲存執行之答覆 計數’控制邏肖66可分別儲存執行之來源節點、來源單 元與來源標籤於來源節點領域94、來源單元領域95、鱼 來源標籤領域92。來源節點領域94、來源單元領域9/、、 與來源標籤領域92 Τ以與資料緩衝儲存器槽位置8〇之對 應領域84、88、與82相似之方式使用。 答覆計數領域96可予起始,當至執行之分配到達該 執行預期之答覆數目。當具來源節點、來源單元、與來源 標籤分別儲存於領域94、95與92之答覆封包被接收,則 答覆計數將減少。當答覆計數到達零,則所有答覆已接收 且執行將交付。或者,計數將由零起始,且答覆封包可能 引起答覆計數之增加’直到接收了預期之答覆數目。 接收狀態領域98可用以指示接收之資料之狀態。狀 癌指不至快速緩衝儲存區區塊之存取權利,及維持快速緩 衝儲存區區塊連貫之責任,其為當節點12Α接收快速緩衝 儲存區區塊時所獲得。於一個示範具體實施例,將使用 MOESI(修改、擁有、專^用、共享、與無效)連貫狀態且接 I—I----11 —Aw -------訂—-------- (請先閱讀背面之注意事項再填寫本頁)I 521189 A7 B7 V. Description of the invention (37) (Please read the note on the back before filling this page) The memory can be provided as one or more buffer memory slots divided between interface logic (for each virtual Channel type). In this specific embodiment, the buffer memory does not need to be assigned to interface logic that is not connected to another node (for example, the interface logic 18C of the example in Figure 1), so that the use efficiency of the buffer memory slot is maximized. Therefore, otherwise, the buffer memory allocated to the interface logic 18c will be allocated for use by the interface logic 18A to 18C. Referring to FIG. 12, there is shown a diagram illustrating a specific embodiment of the position of the data buffer memory slot in the data buffer memory slot 68. As shown in FIG. Other specific embodiments are possible and considered. In the specific embodiment of FIG. 12, the data buffer storage slot position 80 includes the source tag field 82, the source point field 8 4, the source early field 8 and the data field $ 6. When the control logic 66 allocates the data buffer storage The slot position 80 is used to store the execution response data packet. The control logic 66 can store the execution source node, source unit, and source tag in the source node field, the source unit field 88 ', and the source tag field 82, respectively. Yinlai, Dundi, Shuiyi point, source unit, and source tag uniquely identify an unfinished execution, and the source node source unit, and source tag are the intellectual property of the Ministry of Economic Affairs corresponding to the unfinished execution. The employee's consumer cooperative prints and carries out the response packets (with the corresponding data packets, and the pair of daggers) identified by the control logic 66, and the data packets can be stored in the assigned items. For example, if the combined thin packet specifies the received reply data packet, then the reply packet :: node, source unit, and source tag will correspond to the source node field: unit field 88, and source tag field 82. Bass, Suwon 敕. It is determined that the position of the data buffer memory slot of the reply data is 80.羑 Without knife, copy from the reply data buffer storage to the allocation of funds :: 枓 Then you can ___ One-pin needle buffer storage slot position This paper size applies Chinese National Standard (CNS) A4 specification (210 ----- — 37 91890 521189 A7 printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs ------------- B7___ V. Description of the invention (38) 80 in the field of shell materials 86. In an exemplary embodiment, The data area% may contain a block of fast buffer storage area of data. 〃 Next, referring to FIG. 13, an icon specific example of the reply counter 90 in the reply counter slot 70 is shown. Other specific embodiments are Possibility and consideration. In the specific embodiment of FIG. 13, the reply counter 90 packs 3 the source tag field 92, the source node field 94, the source unit field 95, the reply count field%, and the receive status field. When the control logic 66 assigns a reply The counter 90 stores the response count of the execution, and the control logic 66 can store the executed source node, source unit, and source tag in the source node field 94, the source unit field 95, and the fish source tag, respectively. Domain 92. Source node domain 94, source unit domain 9 /, and source tag domain 92 are used in a similar manner to the corresponding fields 84, 88, and 82 of the data buffer memory slot position 80. The reply count field 96 may Initially, when the allocation to execution reaches the expected number of replies for that execution. When the response packets with source nodes, source units, and source tags stored in fields 94, 95, and 92 are received, the response count will decrease. When The response count reaches zero, then all responses have been received and execution will be delivered. Alternatively, the count will start at zero and the response packet may cause the response count to increase until the expected number of responses is received. The reception status field 98 can be used to indicate receipt. The state of the data. Carcinoma refers to the right to not access the cache area and the responsibility to maintain the consistency of the cache area, which is obtained when the node 12A receives the cache area. It is implemented in a demonstration. For example, the MOESI (Modify, Own, Exclusive, Share, and Invalid) status will be used and I—I ---- 11 —Aw ---- --- Order ---------- (Please read the notes on the back before filling this page)

經 濟 部 智 慧 財 產 局 員 製 A7 五、發明說明(39 ) 收狀]i領域98將編碼至其中一個支持狀態。或者,可使用 任何其他適當連貫狀態組(例如,MESI狀態)。接收狀態 項域98將起始至對應於無其他節點具由執行傳送之快速 緩衝儲存區區塊副本之條件之狀態。當接收答覆後,將更 新接收狀態領域。例如,若一個探查答覆指示一份快速緩 衝儲存區區塊副本由探查節點所維持,或污穢資料具有答 覆則接收狀悲領域98將對應地更新。於一個具體實施 例,共享位元將包含於探查答覆封包以指示一份快速緩衝 儲存區區塊副本由提供探查答覆之被探查節點所維持。此 外,由探查節.點#收一個讀取答覆封包可指示節點具一份 2速緩衝儲存區區塊之污穢副本。讀取答覆封包亦可包含 共旱位元以指示一份快速緩衝儲存區區塊副本是否由探查 之節點所維持。 一 需注意的是施行資料緩衝儲存器槽68與答覆計數器 以刀配資源僅為示範且分配資源以處理用於未完成 執仃之答覆可以其他方式施行。例如,可維持一個未完成 =仃表格。表格可包含與上述相似或相等f訊之來源節 點、來源單元、來源標籤、資料、接收狀態、與发覆叶數, 允許控制邏輯66判定是否已接收所有之答覆。 參照第14圖,顯示接收封包之部分示範封包處理邏 之操作流程圖。其他具體實施例為可能及 =圖所顯示之步驟為易於瞭解,以一個特定順序㈣: ^何適當順序皆可使用。此外,步驟可使用封包處理邏 輯58^^輯平行執行。對於每個界面邏鈒似至 本紙張伐格⑵〇 X 297公爱r 91890 -----------裳--------訂--------- (請先閱讀背面之注意事項再填寫本頁) 39 521189 經濟部智慧財產局員工消費合作社印製 A7 〜 1 —............ B7 五、發明說明(40 ) ^ '〜-- 18C,第14圖所說明之步驟可平行且獨立地執行,因位元 時間可同時由每個界面邏輯接收。 第14圖所說明之具體實施例以一連串位元時間接收 封包至封包處理邏輯58。其他具體實施例可累積封包之位 元時間於界面邏輯18A至18C並提供完成封包至封包處理 邏輯58,於此情況下封包處理邏輯58將消除關於管理封 包接收於位元時間之步驟。第14圖所說明之具體實施例, 當接收位元時間時,封包處理邏輯58由界面邏輯接收信 號,指示所接收之位元時間是否為資料封包或命令封包^ 一部分。若位元時間為資料封包位元時間(決定區塊ι〇〇), 則位元時間將儲存於分配緩衝儲存器位置裡資料緩衝儲存 器中,此分配緩衝儲存器位置由對應於界面邏輯(步驟ι〇2) 之貝料封包主動暫存器所指示。若資料封包位元時間為資 料封包之最後位元時間,則控制邏輯66可使對應資料封包 主動暫存器無效。 於另方面’若位元時間為命令封包位元時間,則封 包處理邏輯58判定是否正在進行接收命令封包(例如,若 封包主動暫存器有效,決定區塊1〇4)。若命令封包正 在進行’則位元時間將儲存於由命令封包主動暫存器所指 示之命令封包緩衝儲存器(步驟106)。若命令封包位元時間 為封包之最後位元時間,則控制邏輯66將使對應命令封包 主動暫存器無效。 若命令封包並非正在進行,則封包處理邏輯將解 碼最近接收到的敌包之命令領域,以辨識封包所分派之 ^--------^--------- (請先閱讀背面之注意事項再填寫本頁) 本紙張尺度適用中國國家$準(CNS)A4規格⑽x 297公餐) 40- 91890 521189 經濟部智慧財產局員工消費合作社印製 A7 五、發明說明(41 ) 擬通道(步驟⑽)。將分配對應於辨識之虛 包緩衝儲存器位置,且命令封包位元之η封 令封包緩衝儲存器位置。 =子於分配之命 此外,封包處理邏輯58判 -個隨後資料封包(決定…具體指定 包,則封包處理邏輯58由對應辨識虛擬通了資料封 存器分派-個資料衝緩儲存器位置,並二:餘 暫存器以指示分派之資料衝緩儲存器二 置(步驟112)。 衡緩儲存1§位 參照第1 5圖,顯示一個用於處理浐 後請求封包或後請求封包)部分 =、匕之(例如非 之流程H 且种杳 封包處理邏輯58操作 之-程圖。其他具體實施例為可能及予考 圖所顯示之步驟為易於睁解 〜I、、第15 Λ丄 u 一個特定順序說日月,缺任 何適當順序皆可使用。此外’步 …、任Member of the Intellectual Property Office of the Ministry of Economic Affairs A7 V. Description of Invention (39) Receipt] i field 98 will be coded to one of the supported states. Alternatively, any other suitable coherent state group (eg, MESI state) can be used. Receiving Status The entry field 98 will start to a state corresponding to the condition that no other node has a copy of the fast buffer storage area block that is being transmitted. When a reply is received, the reception status field is updated. For example, if a probe response indicates that a copy of the fast buffer storage area is maintained by the probe node, or if the foul data has a response, the receiving field 98 will be updated accordingly. In a specific embodiment, the shared bits will be included in the probe response packet to indicate that a copy of the cache block is maintained by the probed node that provided the probe response. In addition, receiving a read reply packet from the exploration section. Point # can instruct the node to have a dirty copy of the 2-speed buffer storage block. The read reply packet may also include a common drought bit to indicate whether a copy of the cache block is maintained by the node being probed. 1. It should be noted that the implementation of the data buffer memory slot 68 and the reply counter. The use of knife allocation resources is only an example, and the allocation of resources to process the reply for incomplete execution can be implemented in other ways. For example, an incomplete = 仃 form can be maintained. The form may contain source nodes, source units, source tags, data, receiving status, and number of replies similar to or equivalent to the above, allowing the control logic 66 to determine whether all replies have been received. Referring to Fig. 14, a flow chart showing part of the packet processing logic for receiving packets is shown. Other specific embodiments are possible and the steps shown in the figure are easy to understand, in a particular order: ^ Any appropriate order can be used. In addition, steps can be performed in parallel using packet processing logic 58 ^^. For each interface, the logic is as close as this paper. 297 Public Love 91890 ----------- Shang -------- Order --------- (Please read the precautions on the back before filling this page) 39 521189 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 ~ 1 —............ B7 V. Description of Invention (40) ^ '~-18C, the steps illustrated in Figure 14 can be performed in parallel and independently, because the bit time can be received by each interface logic at the same time. The specific embodiment illustrated in FIG. 14 receives packets to the packet processing logic 58 in a series of bit times. Other embodiments may accumulate the bit time of the packets at interface logics 18A to 18C and provide completion packet-to-packet processing logic 58. In this case, the packet processing logic 58 will eliminate the step of managing packet reception in bit time. In the specific embodiment illustrated in FIG. 14, when receiving bit time, the packet processing logic 58 receives a signal from the interface logic, indicating whether the received bit time is part of a data packet or a command packet ^. If the bit time is the bit time of the data packet (determined block ι〇〇), the bit time will be stored in the data buffer memory in the allocation buffer memory location, and the allocation buffer memory location is corresponding to the interface logic ( Step ι〇2) indicated by the active packet register. If the data packet bit time is the last bit time of the data packet, the control logic 66 can invalidate the corresponding data packet active register. On the other hand, if the bit time is the command packet bit time, the packet processing logic 58 determines whether the command packet is being received (for example, if the packet active register is valid, block 104 is determined). If the command packet is in progress', the bit time will be stored in the command packet buffer memory indicated by the command packet active register (step 106). If the command packet bit time is the last bit time of the packet, the control logic 66 will invalidate the corresponding command packet active register. If the command packet is not in progress, the packet processing logic will decode the command field of the recently received enemy packet to identify the ^ -------- ^ --------- (please assign the packet) (Please read the notes on the back before filling this page) This paper size is applicable to the Chinese National Standard (CNS) A4 size x 297 meals 40- 91890 521189 Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 V. Invention Description ) Simulated channel (step ⑽). The buffer buffer memory location corresponding to the identified virtual packet will be allocated, and the η packet buffer memory location of the commanded packet bit will be allocated. = Child's order of distribution In addition, the packet processing logic 58 judges a subsequent data packet (determining ... specifically specifying the packet, then the packet processing logic 58 assigns a data buffer memory by a corresponding identification virtual data buffer storage location, and Second: The remaining registers are buffered with the assigned data (step 112). The buffer store 1§ refers to Figure 15 and shows a section for processing subsequent request packets or subsequent request packets. = (For example, the non-flow H and the flow chart of the operation of packet processing logic 58. Other specific embodiments are possible and the steps shown in the figure are easy to understand. I, 15th The specific order is called sun and moon, and any appropriate order can be used. In addition, 'step ..., any

1之用封包處理邏輯58 裡之組合邏輯平行地執行。對於每個界面邏輯18A至18C :/或每個命令封包衝緩儲存器,第15圖所 平行且獨立地執行,因由不同界面及/或不同虛擬通道來之 請求封包實際上獨立。或者,一個社 10A E 個所求封包(或每界面邏輯 !8A至18C之-個請求封包)可根據適當公平算式選擇加 以處理。大體而言,由-個虛擬通道選擇加以處理之封包 遵守封包於虚擬通道裡之順序規則(例如,由相同來源至相 同終點之封包依順序選擇),但,若要求,封包可不依順序 選擇處理,假如順序規則允許不依順序選擇。 如第15圖所說明,封包處理邏輯58判定請求封包之 [紙張尺度適用中國國家標準(CNS)A4規格⑵◦ χ 297公爱y 91890 Αν ^--------^---------^__w. (請先閱讀背面之注意事項再填寫本頁) 41 521189 消 A7 B7 五、發明說明(42 ) 目標是否為”該節點,,(決定區塊126)。例如,封包 58可比較*求封包記錄於終點節點(DestNQde)領邏輯 節點出與儲存於節點ID暫存器72裡之節點二':點 IDs相符,則垃盆μ上、 右卽點 則接者睛未將以”該節點”為目標。芒这令 標,包處一可能轉送 科封包,若具體指定)至適當終點節點(步驟128/、 ❹n處理邏輯58可維持辨識那個界 ° 為轉送封包至特定終點節點之傳送界面之封至 格。封包處理邏輯58接著經由辨識之界面邏輯 2 求封包至終點節點,若邏輯58亦判定 户月 (與資料衝緩储存器’若具想指定資料封包d器 包路由表格具趙指定之輕接之接收節點可取得。= 體實施例’若請求封包具體指定資料封包,則邏輯Μ;: 緩轉送請求封包,直到邏輯58接收到具體指定之資料封包 為止。 若請求封包以"該節點”為目標’則封包處理邏輯π 可提供請求封包(與對應資料封包,若可適用)至記憶體控 制器16A(步驟130)。需注意的是,一旦處理了(即由 該節點”轉送或接受)請求封包,則請求封包將由命令衝緩 儲存器移除,且任何對應資料將由命令資料衝緩儲存器移 除。 需注意的是,探查請求可以相似方式處理。然而,因 為探查請求不具對應資料封包,資料封包之檢查'將予省 略。再者,因為探Μ求可為廣播封包,探查請求可於内 氏張尺度義中關家鮮(CNS)A4規格 42 91890 | 裝 521189 B7 五、發明說明(43 ) 部處理(例如,藉由探查節點 送。探查節點,無論,,診〜‘,”、快速緩衝儲存區)與轉 緩衝儲存區後,產生:即點:其他節點,可於探查快速 生與傳运探查答覆封包。 需注意的是,若遽抵 料封包,則不同且體包具體指定一個對應資 包尚未被接收。❹可處理請求封包,即使資料封 ,郎點可等待資料封包之抿達,以簡 化=之轉送或允許具體指定已完全接收之資料封包之i -封包於相同連接被轉送 、㈣。之另 包#去&拉A 右田。月求封包處理時,資料封 =未被接收,則當資料封包最後被接The combination logic in packet processing logic 58 of 1 is executed in parallel. For each interface logic 18A to 18C: / or each command packet buffer memory, the execution in Figure 15 is performed in parallel and independently, because the request packets from different interfaces and / or different virtual channels are actually independent. Alternatively, a group of 10A E requested packets (or one request packet per interface logic! 8A to 18C) can be selected and processed according to appropriate fairness formulas. Generally speaking, the packets selected for processing by a virtual channel follow the order of the packets in the virtual channel (for example, packets from the same source to the same destination are selected in order), but if required, the packets can be selected out of order for processing , If the order rule allows selection out of order. As illustrated in FIG. 15, the packet processing logic 58 determines that the requested packet [the paper size applies the Chinese National Standard (CNS) A4 specification⑵◦ χ 297 公 爱 y 91890 Αν ^ -------- ^ ---- ----- ^ __ w. (Please read the notes on the back before filling out this page) 41 521189 消 A7 B7 V. Description of invention (42) Whether the target is "the node," (decision block 126). For example, The packet 58 can be compared. * Find the packet recorded in the destination node (DestNQde) and the logical node out and the second node stored in the node ID register 72. The point IDs match. No target will be "this node". If this is the target, the package may forward the packet to the appropriate destination node (if specified) (step 128 /, ❹n processing logic 58 can maintain the identification of the boundary °) to forward the packet to Envelope of the transmission interface of the specific destination node. The packet processing logic 58 then seeks the packet to the destination node through the identified interface logic 2. If the logic 58 also determines the user month (and the data buffer storage 'if you want to specify the data packet d' The packet routing table with the receiving node designated by Zhao can =. Example embodiment 'If the request packet specifically specifies a data packet, the logic M ;: The request packet is slowly forwarded until the logic 58 receives the specifically specified data packet. If the request packet targets " the node as the target' then The packet processing logic π can provide a request packet (and the corresponding data packet, if applicable) to the memory controller 16A (step 130). It should be noted that once the request packet is processed (that is, "forwarded or accepted by this node"), The request packet will be removed by the command cache and any corresponding data will be removed by the command data cache. It should be noted that the probe request can be processed in a similar way. However, because the probe request does not have a corresponding data packet, the data packet The "check" will be omitted. Furthermore, because the search request can be a broadcast packet, the search request can be in the inner scale Zhang Yiyi Guan Jiaxian (CNS) A4 specification 42 91890 | 521189 B7 V. Description of the invention (43) After processing (for example, by sending a probe node. Probe nodes, regardless of, diagnosis ~ ', ", fast buffer storage area) and transfer to the buffer storage area, Health: On-site: Other nodes can reply to packets quickly during exploration and transport exploration. It should be noted that if the packet is not received, it is different and the physical package specifies a corresponding packet that has not been received. ❹ Can process the request Packet, even if the data is sealed, Lang Dian can wait for the data packet to arrive, in order to simplify the transfer of or allow the i-packet that specifically specifies the data packet that has been completely received to be forwarded on the same connection, and the other packet # 去 & Pull A right field. When the month packet is processed, the data packet = not received, then when the data packet is finally received

以關於第14圖之上述方式處理。 f"T 參照第16圖,顯示一個流程圖,說明用於處理答覆 # 為二包處理邏輯58之操作。其他具體實施例 為了…考慮。雖然第16圖所顯示之步驟為易於瞭解, 以一個特定順序說明,然可使用任何之適當順序。此外, 步驟可使用封包處理邏輯58裡之組合邏輯平行地執行。對 於每個界面邏輯18Ai 18C及/或每個答覆封包衝緩儲存 盗,第16圖所說明之步驟可平行與獨立地執行,因由不同 界面及/或不同虛擬通道來之請求封包實際上獨立。 員 工 消 如第16圖所顯示,封包處理邏輯58大體上與上述相 同方式,判定答覆封包之終點節點是否為,,該節點"(決定區 塊144)。若終點節點為另一節點,則封包處理邏輯%轉 送答覆封包(與對應資料封包,若可適用),若位於答覆封 包轉送之線路上接收節點裡之答覆虛擬通道之閒置ς緩儲 存器位置可取得(臾驟146)。 本纸張尺度適用中國國家標準(CNS)A4規格(210 x 297公釐) 91890 521189Processed in the manner described above with respect to FIG. 14. f " T Referring to FIG. 16, a flowchart is shown to explain the processing of the response # for the second packet processing logic 58 operation. Other specific embodiments are considered for ... Although the steps shown in Figure 16 are easy to understand and are described in a particular order, any suitable order may be used. In addition, the steps may be performed in parallel using combinational logic in the packet processing logic 58. For each interface logic 18Ai 18C and / or each reply packet to buffer storage theft, the steps illustrated in Figure 16 can be performed in parallel and independently, because the request packets from different interfaces and / or different virtual channels are actually independent. Staff Consumption As shown in Figure 16, the packet processing logic 58 determines the end node of the reply packet in substantially the same manner as above, and the node is " (decision block 144). If the destination node is another node, the packet processing logic will forward the reply packet (and the corresponding data packet, if applicable). If it is located on the line where the reply packet is forwarded, the idle buffer location of the reply virtual channel in the receiving node can Obtained (step 146). This paper size applies to China National Standard (CNS) A4 (210 x 297 mm) 91890 521189

五、發明說明(44 經 濟 部 智 慧 財 產 局 員 工 消 費 合 作 社 印 製 91890 若答覆封包之終點為”該節點”,則封包處理邏 減V對應。覆δ十數器並更新所接收狀態(若答覆為一個探 查答覆,指示所接收狀態將由隱含值狀態改變)(歩二 148)此外右答覆封包具體指定資料封包,則資料封^ 將由對應答覆資料衝緩儲存器移動至分配至該答覆之= 衝緩儲存器(步驟1 5〇)。 广 於減少计數器後,封包處理邏輯可測試計數器以判定 是否所有答覆封包已接收且處理(決定區塊152)。若判定為 所有答覆封包已接收且處理,則封包處理邏輯58可通知記 憶體控制器16Α或快速緩衝儲存區5〇與54其可完成執 行,且由資料衝緩儲存器提供相關資料與由答覆計數器提 供接收狀態(若可適用(步驟154))。需注意的是,一旦處理 了答覆封包(即’由"該節點”轉送或接受),則答覆封包將 由答覆衝緩儲存器移除且任何對應答覆資料將由答覆資料 衝緩儲存器移除。 而庄思的是,於某些具體實施例,若選擇之答覆封包 具體指定對應之資料封包,則將處理答覆封包,即使尚未 接收貝料封包(即,資料封包尚未存於資料衝缓儲存器), 或答覆封包處理可等待資料封包之抵達,以簡化資料之轉 送或允許具體指定已完全接收之資料封包之另一封包於相 同連接轉送。若當答覆封包處理時,尚未接收資料封包, 則當資料封包最後接收時,資料封包可以關於第14圖之上 述方式處理。 17圖,顯示一個流程圖,說明用於起始一個 本紙張尺度適用中國國家標準(CNS)A4規格⑵Gχ 297公餐)-------- 44 . 裝--------訂---------WAWi (請先閱讀背面之注意事項再填寫本頁) 189 189V. Description of the Invention (44 Printed by the Employees' Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 91890 If the end point of the reply packet is "the node", the packet processing logic is reduced by V. Override the δ decimator and update the received status (if the reply is A probe reply indicates that the received status will be changed from the implicit status) (歩 二 148) In addition, the right reply packet specifically specifies the data packet, and the data envelope ^ will be moved from the buffer storage of the response reply data to the one allocated to the reply = red Slow storage (step 150). After reducing the counter more widely, the packet processing logic can test the counter to determine whether all reply packets have been received and processed (decision block 152). If it is determined that all reply packets have been received and Processing, the packet processing logic 58 may notify the memory controller 16A or the fast buffer storage areas 50 and 54 that it can complete execution, and provide the relevant data from the data buffer storage and the reception status from the response counter (if applicable ( Step 154)). It should be noted that once the reply packet is processed (that is, 'forwarded or accepted by " the node', the reply is The packet will be removed from the reply buffer and any reply data will be removed from the reply buffer. In some specific embodiments, if the selected reply packet specifies the corresponding data packet, then The reply packet will be processed even if the shell packet has not been received (ie, the data packet has not been stored in the data buffer storage), or the reply packet processing can wait for the arrival of the data packet to simplify the transfer of the data or allow specific designation of a fully received packet The other packet of the data packet is forwarded on the same connection. If the data packet has not been received when the reply packet is processed, then when the data packet is finally received, the data packet can be processed in the manner described in Figure 14. Figure 17 shows a flowchart The description is used to start a paper standard applicable to the Chinese National Standard (CNS) A4 specifications (Gχ 297 public meals) -------- 44. Packing -------- Order ------ --- WAWi (Please read the notes on the back before filling out this page) 189 189

五、發明說明(45 ) ,包於節點所連接之通訊線路上之部分示範封包處理邏輯 8之操作。其他具體實施例為可能及考慮。雖然第 所顯示之步驟為易於瞭解,以一個特定順序說明,然任二 適虽順序皆可使用。此外,步驟可使用封包處理邏輯U 裡之組合邏輯平行地執行。封包處理邏可於連接上起 始封包,以回應由快速緩衝儲存區5〇與54來之填入請求/ 犧牲區塊,及/或由處理器核心52與%執行之操作。此 外,可起始探查封包,以回應選擇一個記憶體操作處裡之 記憶體控制器16A。答覆封包可於探查處理後起始,並回 應由,,該節點”產生或以"該節點”為目標之執行完成。 如第17圖所說明,封包處理邏輯58判定欲起始之封 包疋否可能導致資料返回該節點(決定區塊16〇)。例如,由 節點起始之讀取執行引起資料返回節點,而由節點起始之 寫入執行不引起寊料返回節點。Changet〇Dirty執行可能導 致資料返回節點(若另一節點具影響之快速緩衝儲存區區 塊於污穢狀態)。相似地,探查封包可能引起資料返回至該 節點,若另一節點具影響之快速緩衝儲存區區塊於污穢狀 ^ 且探查答覆指向該郎點。若執行可能導致資料返回至 該節點,則封包處理邏輯58將由資料緩衝儲存器槽68分 配資料緩衝儲存器(步驟162)。 此外’封包處理邏輯5 8判定探查答覆是否將返回節 點以回應封包(步驟1 6 6)。若封包為一個探查,或若封包正 起始一個執行,導致探查答覆至”該節點”(例如,一個讀取 執行),則探查答覆_j^返_既將產生。若探查答覆將返回”該 -----------裝--------訂--------- (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 本紙張尺度適用中國國家標準(CNS)A4規格(210 x 297公釐) 45 91890 189 2 5 A7Fifth, the invention description (45), part of the packet on the communication line connected to the node demonstrates the operation of the packet processing logic 8. Other specific embodiments are possible and considered. Although the steps shown in paragraph 1 are easy to understand, they are described in a specific order, but any order may be used. In addition, the steps can be performed in parallel using the combinational logic in the packet processing logic U. The packet processing logic may initiate packets on the connection in response to fill requests / sacrifice blocks from the cache areas 50 and 54 and / or operations performed by the processor cores 52 and%. In addition, a probe packet may be initiated in response to selecting a memory controller 16A in a memory operation location. The reply packet can be initiated after the probing process, and it is answered that the execution of the node "generated or targeted by" the node "is completed. As illustrated in Figure 17, the packet processing logic 58 determines whether the packet to be initiated may cause data to be returned to the node (decision block 16). For example, a read execution initiated by a node causes data to be returned to the node, while a write execution initiated by a node does not cause data to be returned to the node. Changet〇Dirty implementation may cause data to return to the node (if another node has an affected fast buffer storage area in a dirty state). Similarly, the probe packet may cause the data to be returned to the node. If the cache buffer area affected by another node is dirty, and the probe response points to the point. If execution may result in data being returned to the node, the packet processing logic 58 will allocate a data buffer memory from the data buffer memory slot 68 (step 162). In addition, the 'packet processing logic 5 8 determines whether the probe response will return to the node in response to the packet (step 1 6 6). If the packet is a probe, or if the packet is initiating an execution, causing the probe response to "the node" (for example, a read execution), then the probe response _j ^ 回 _ will be generated. If the answer to the inquiry will return "this ----------- install -------- order --------- (Please read the precautions on the back before filling this page) Printed by the Employees' Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs, the paper size applies to the Chinese National Standard (CNS) A4 (210 x 297 mm) 45 91890 189 2 5 A7

五、發明說明(46) 配答覆计數器並設定起始計數, 個或任何其他適 節點㈣包處理邏輯58分配—個答覆計數器 執行之接收答覆,並起始答覆計數器至預期答覆數目: 如,於協調結構之節點數目)(步驟168)。 ( 封包處理邏輯58進一步判定县不* a # /幻疋疋否其他答覆將返回至 該節點(例如,SrcD〇ne、TgtDone 等 k m /ft > ^ 哥)以回應起始之封包 驟⑹)。若此類其他答覆被返回,則封包處理邏輯μ分 當開始計數(步驟165)。隨後,封包處理邏輯58傳送封包 驟 170) 〇 藉由於起始一個執行前,預先分配資源以處理答覆封 包(包含資料),答覆封包可於接收時處理。因此,即使一 些答覆封包可能與其他答覆封包具邏輯/協定衝突,答覆封 包可合併於答覆虛擬通道,因為實際衝突藉由於在其終端 節點接收時,處理每個答覆封包而消除。 接著參照第18圖,顯示一個區塊圖示,說明包含緩 衝儲存器釋放領域之inf0封包1 8〇之一個具體實施例。其 他具體實施例為可能及考慮。於第18圖所說明之示範具體 實施例’緩衝儲存器釋放領域包含各緩衝儲存器類型。 RespData領域對應於答覆資料緩衝儲存器,且Resp〇nse 領域對應於答覆緩衝儲存器。相似地,postCmdData領域 對應於後命令資料緩衝儲存器,且P〇stCmd領域對應於後 命令緩衝儲存器。]S[onpostData領域對應於非後命令資料 緩衝儲存器,且NonPostCmd領域對應於非後命令緩衝儲 存器。Probe領域^對i於探查緩衝儲存器。 11 11 ^--------訂--------- (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 本紙張尺度適用中國國家標準(CNS)A4規格(210 x 297公釐) 46 91890 521189 經濟部智慧財產局員工消費合作社印製 A7 五、發明說明(47) 每個緩衝儲存器釋放領域包含兩個位元,允許釋放, 或解放,每個種類最多三個緩衝儲存器位置,經由傳送單 一 info封包180由傳送器至接收器於特定通訊連接。若設 有特定類型之多於三個緩衝儲存器位置,則若需要,額外 之info封包將用於釋放額外的緩衝儲存器位置。封包處理 邏輯58可包含各類型緩衝儲存器與各界面邏輯18八至μ。 之緩衝儲存器計數,指示由接收器提供,於各界面連接之 連線之另一末端之各類型緩衝儲存器總數。這些計數器可 於啟動電源時起始,藉由傳送inf〇封包由接收器至傳送 器,且緩衝儲存器釋放領域設定至於該接收器可取得之緩 衝儲存器位置數目。若接收器對於特定類型具有多於三個 之緩衝儲存器位置,則將傳送數個inf〇封包。 封包處理邏輯58可傳送封包於特定虛擬通道,只要 對應類型之緩衝儲存器(與資料緩衝儲存器,若封包具體指 定資料封包)於封包將傳送之接收器可取得。此外,對於由 於封包處理邏輯58處理封包,使得其於節點12A釋放之 每個界面18A至18C,封包處理邏輯58記下每個類型之 緩衝儲存器位置數目。定期地,封包處理邏輯58經由每個 界面邏輯18A至18C,傳送inf〇封包18〇,指示於個別通 訊連接上之發送器,已由封包處理邏輯58釋放之緩衝儲存 器位置數目。 -非協調結楫 參照第19圖,顯示I/O次系統2〇〇 一個具體實施例之 區塊鼠示。其他臭體^實施例為可能及考慮。於第丨9圖之具 ‘紙張尺度翻巾關家標準(CNS)A4祕⑵Gx 裂--------訂--------- (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 521189 A7 B7 五、發明說明(48) 體實施例,I/O次系統200包含主要橋樑202與複數個I/O 節點204A、204B與204C。主要橋樑202經由包含線路 241至24J之協調聯繫連接至處理節點12D,並進一步經由 包含線路24K至24L之非協調聯繫連接至I/O節點204A。 I/O節點204A至204C經由額外非協調連接,以連接鏈連 接結構而互連(線路24N至240)。需注意的是,雖然顯示 之主要橋樑202與處理節點12分離,然若需要的話,主要 橋樑202可結合於處理節點裡。 大體而言,主要橋樑202轉移移動於I/O次系統與處 理節點間之封包。例如,一個由I/O節點204B傳送且具目 標於處理節點12A裡之非協調封包通過I/O節點204A至 主要橋樑202。主要橋樑202轉移非協調封包至對應協調 封包。 大體而言,I/O節點204A至204C可於I/O次系統200 裡起始執行。執行最終將以另一 I/O節點204A至204C為 目標,一個位於另一非協調聯繫之I/O節點,或記憶體14。 為簡單化,執行可於主要橋樑202與I/O節點204A至204C 執行,不管實際目標為何。例如,主要橋樑202可於I/O 次系統200裡起始執行,代表由處理節點12A至1 2D來之 請求,且可處理由I/O節點204A至204C起始,目標於電 腦系統裡協調結構或另一主要橋樑之執行。 於I/O次系統200之封包於I/O串流裡行進,其為可 由非協調結構獨立處理之群集訊務。於一個示範具體實施 例,對m不H於非協調結構内,且所有封包可行進 -----------裝·— (請先閱讀背面之注意事項再填寫本頁) 訂— 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 48 91890 521189 經濟部智慧財產局員工消費合作社印製 A7 五、發明說明(49) 至主要橋樑202或由主要橋樑2〇2行進。因此,由1/〇節 點204 A至204C傳送之封包可經由連接鏈連接(即,”上游 )流向主要橋樑202。需注意的是,由1/〇節點2Q4A至204C 發佈之請求封包包含來源節點之UnitIE^相似地,由1/〇 節點204A至204C發佈之答覆封包包含產生答覆之節點之 UmtID。因此,UnitID可用於辨識上游封包之1/()串流。 由主要橋樑202傳送之封包可流向接收1/〇節點2〇4a 至204C(即,’’下游”)。需注意的是,於一個示範具體實施 例,下游答覆包含答覆將送至之節點之UnhID,而下游請 求對於UnitID具零數值,其乃為主要橋樑2〇2保留之編 碼。因此,個別I/O串流可能無法於下游請求訊務中辨識, 且其假設為所有下游訊務(請求與答覆)皆於相同1/〇串 流。 於結構裡之所有裝置皆編寫程式為將其主要橋樑方 向視為上游"。藉由連接I/O節點與主要橋樑於連接鏈, 且使I/O節點僅與主要橋樑通訊(於執行程度),提供了一 個I/O次系統200之邏輯觀點,其中I/O節點呈現直接連 接至主要橋標而非其他節點。 I/O次系統200可於連接鏈連接之兩端連接至主要橋 樑,以提供聯繫失敗情況下之堅實,或允許共享1/〇次系 統於處理節點群間。於連接鏈第一端點之橋樑可指定為主 要橋樑且於另一端之橋樑可指定為從屬橋樑。於一個示範 具體實施例,次系統裡所有I/O節點屬於主要橋樑。於债 測聯繫失敗後’於失敗每邊H/O節點將重新編寫程式使 11 --------訂·-------- (請先閱讀背面之注意事項再填寫本頁)V. Description of the invention (46) Match the reply counter and set the initial count, or any other suitable node packet processing logic 58. Assign a received counter to receive the reply, and start the reply counter to the expected number of responses: , The number of nodes in the coordination structure) (step 168). (The packet processing logic 58 further determines that the county does not * a # / 疋 疋 疋 疋 No other replies will be returned to this node (for example, km / ft > ^ brother, such as SrcDone, TgtDone) in response to the initial packet burst) . If such other responses are returned, the packet processing logic will start counting (step 165). Subsequently, the packet processing logic 58 transmits the packet (step 170) 〇 Since the resource is allocated in advance to process the reply packet (including the data) before starting an execution, the reply packet can be processed upon receipt. Therefore, even though some reply packets may have logical / protocol conflicts with other reply packets, the reply packets can be merged into the reply virtual channel because the actual conflict is eliminated by processing each reply packet when it is received at its end node. Next, referring to FIG. 18, a block diagram is shown to explain a specific embodiment of the inf0 packet 180 containing the buffer memory release field. Other specific embodiments are possible and considered. The exemplary embodiment illustrated in Fig. 18 ' buffer storage release field includes each buffer storage type. The RespData field corresponds to the response data buffer storage, and the RespOnse field corresponds to the response buffer storage. Similarly, the postCmdData field corresponds to the post-command data buffer, and the PostCmd field corresponds to the post-command buffer. ] S [onpostData field corresponds to non-post-command data buffer memory, and NonPostCmd field corresponds to non-post-command buffer memory. Probe field ^ to probe buffer memory. 11 11 ^ -------- Order --------- (Please read the notes on the back before filling out this page) Printed by the Consumers' Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs This paper is applicable to China Standard (CNS) A4 specification (210 x 297 mm) 46 91890 521189 Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 V. Description of the invention (47) Each buffer storage release area contains two bits, allowing release, Or liberate, each type has a maximum of three buffer memory locations, and a single info packet 180 is transmitted from the transmitter to the receiver for a specific communication connection. If there are more than three buffer memory locations of a particular type, additional info packets will be used to release additional buffer memory locations if needed. The packet processing logic 58 may include various types of buffer memory and each interface logic 188 to μ. The buffer memory count indicates the total number of types of buffer memory provided by the receiver at the other end of the connection connected at each interface. These counters can start when the power is turned on, by transmitting inf0 packets from the receiver to the transmitter, and the buffer memory release field is set to the number of buffer memory positions that the receiver can obtain. If the receiver has more than three buffer memory locations for a particular type, several inf0 packets will be transmitted. The packet processing logic 58 can transmit the packet to a specific virtual channel, as long as the corresponding type of buffer memory (and data buffer memory, if the packet specifically specifies a data packet) is available at the receiver to which the packet will be transmitted. In addition, for the packets processed by the packet processing logic 58 such that each interface 18A to 18C released at the node 12A, the packet processing logic 58 records the number of buffer memory positions of each type. Periodically, the packet processing logic 58 transmits the inf0 packet 180 via each interface logic 18A to 18C, indicating the number of buffer memory locations of the transmitter on the individual communication connection that has been released by the packet processing logic 58. -Non-coordinated structure Referring to FIG. 19, a block diagram of a specific embodiment of the I / O subsystem 200 is shown. Other odorant embodiments are possible and considered. In Figure 丨 9, there is a 'paper scale turning home care standard (CNS) A4 secret Gx crack -------- order --------- (Please read the precautions on the back before filling (This page) Printed by the Intellectual Property Bureau of the Ministry of Economic Affairs's Consumer Cooperatives 521189 A7 B7 V. Description of the Invention (48) system embodiment, the I / O secondary system 200 includes a main bridge 202 and multiple I / O nodes 204A, 204B, and 204C. The main bridge 202 is connected to the processing node 12D via a coordinated connection including lines 241 to 24J, and is further connected to the I / O node 204A via a non-coordinated connection including lines 24K to 24L. The I / O nodes 204A to 204C are interconnected via additional non-coordinated connections in a link chain connection structure (lines 24N to 240). It should be noted that although the main bridge 202 shown is separated from the processing node 12, the main bridge 202 may be incorporated into the processing node if necessary. Generally speaking, the main bridge 202 transfers packets moving between the I / O subsystem and the processing nodes. For example, an uncoordinated packet transmitted by I / O node 204B and targeted at processing node 12A passes through I / O node 204A to main bridge 202. The main bridge 202 transfers uncoordinated packets to corresponding coordinated packets. Generally speaking, the I / O nodes 204A to 204C can be executed in the I / O subsystem 200. Execution will eventually target another I / O node 204A to 204C, one on another non-coordinated I / O node, or memory 14. For simplicity, execution can be performed on the main bridge 202 and I / O nodes 204A to 204C, regardless of the actual goal. For example, the main bridge 202 can be started and executed in the I / O secondary system 200, representing requests from processing nodes 12A to 12D, and can be processed from I / O nodes 204A to 204C, with the goal of coordinating in the computer system Implementation of a structure or another major bridge. The packets in the I / O sub-system 200 travel in the I / O stream, which are cluster traffic that can be independently processed by a non-coordinated structure. In an exemplary specific embodiment, m is not in a non-coordinated structure, and all packets can be entered ----------- loading ... (Please read the precautions on the back before filling this page) Order — This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) 48 91890 521189 Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 V. Description of the invention (49) to the main bridge 202 or from the main bridge 2 〇2 march. Therefore, the packets transmitted by 1/0 nodes 204 A to 204C can flow through the connection chain (ie, "upstream") to the main bridge 202. It should be noted that the request packets issued by 1/0 nodes 2Q4A to 204C contain the source node UnitIE ^ Similarly, the reply packet issued by 1/0 nodes 204A to 204C contains the UmtID of the node that generated the reply. Therefore, UnitID can be used to identify the 1 / () stream of the upstream packet. The packet transmitted by the main bridge 202 can be The flow direction receives 1/0 nodes 204a to 204C (ie, `` downstream ''). It should be noted that, in an exemplary embodiment, the downstream response includes the UnhID of the node to which the response will be sent, and the downstream request has a zero value for UnitID, which is a code reserved for the main bridge 202. Therefore, individual I / O streams may not be identified in downstream request traffic, and it is assumed that all downstream traffic (requests and replies) are on the same 1/0 stream. All devices in the structure are programmed to treat their main bridge directions as upstream ". By connecting I / O nodes with the main bridge in the connection chain, and allowing the I / O nodes to communicate with the main bridge only (at the level of execution), a logical view of the I / O subsystem 200 is provided, in which the I / O nodes present Connect directly to the main bridge and not to other nodes. The I / O secondary system 200 can be connected to the main bridge at both ends of the connection chain to provide solidity in the event of a connection failure, or to allow sharing of the 1/0 secondary system between processing node groups. The bridge at the first end of the connecting chain can be designated as the primary bridge and the bridge at the other end can be designated as the secondary bridge. In an exemplary embodiment, all I / O nodes in the secondary system belong to the primary bridge. After the failure of the debt test contact, the H / O nodes on each side of the failure will rewrite the program so that 11 -------- Order · -------- (Please read the precautions on the back before filling in this page)

91890 291890 2

五、發明說明(50 ) 其屬於失敗個別邊上之主要橋樑。因此,形成兩個1/〇次 系統’且可維持與處理次系統裡之處理節點通訊。於另一 具體實施例,I/O節點可分配於1/0次系統之兩個主要橋樑 間’即使無聯繫失敗。此類結構可協助平衡通訊訊務。 若封包抵達連接鏈之末端(例如,第19圖範例之I/O 節點204C)且I/O節點204A至204C尚未接受封包,則錯 誤將由鏈接末端之I/O節點產生。 大體而言,I/O次系統200將連接24K至24P施行為 一個非協調連接。於一個示範具體實施例,非協調連接之 資料封包定義與第6圖所顯示與描述之有關協調連接之資 料封包定義相似。同樣地,非協調連接之inf〇封包定義與 第3與18圖所顯示之協調inf0封包定義相似(將保留pr〇be 領域)。非協調連接之請求與答覆封包定義說明於第21與 22圖,且將於下列敘述。 於一個示範具體實施例,上述有關協調連接之虛擬通 道定義亦適用於非協調連接。虛擬通道定義與其個別適用 連接於第9圖提出。需注意的是探查請求可能不會用於非 協調連接,且,因此,可取消非協調連接之探查虛擬通道。 參照第20圖,顯示表格210,說明根據電腦系統10 裡非協調連接之一個示範具體實施例所使用封包。其他具 體實施例為可能及考慮,包含任何其他適當封包組與命令 領域編碼。表格210包含命令代碼(CMD)攔,說明分派至 母個命令之命令編碼’虛擬通道(Vchan)攔,定義每個非協 調封包所分派之虚擬通道,命令(Command)欄,包含助記 (請先閱讀背面之注意事項再填寫本頁) 裝--------訂----- 經濟部智慧財產局員工消費合作社印製 本紙張尺度適用中國國家標準(CNS)A4規格(210 x 297公釐) 50 91890 經濟部智慧財產局員工消費合作社印製 521189 A7 ~~ -----21---- 丨-_ 五、發明說明(51) 符號表示命令,與封包類型(packet Type)攔,指示那個封 包30、212、與214(與資料封包36,其中具體指定)使用於 對應命令。 如表格210所說明,非協調封包包含Ν〇ρ、V. Description of the invention (50) It is the main bridge on the side of individual failures. Therefore, two 1 / 0th order systems are formed and communication with the processing nodes in the processing order system can be maintained. In another embodiment, I / O nodes can be allocated between two main bridges of the 1 / 0th system, even if no connection fails. Such structures can help balance communications traffic. If the packet reaches the end of the connection chain (for example, I / O node 204C in the example in Figure 19) and I / O nodes 204A to 204C have not yet received the packet, an error will be generated by the I / O node at the end of the link. Generally speaking, the I / O secondary system 200 will connect 24K to 24P to perform an uncoordinated connection. In an exemplary embodiment, the data packet definition of the uncoordinated connection is similar to the data packet definition of the coordinated connection shown and described in FIG. 6. Similarly, the inf0 packet definition for uncoordinated connections is similar to the coordinated inf0 packet definition shown in Figures 3 and 18 (the pr0be field will be retained). The definitions of request and reply packets for uncoordinated connections are illustrated in Figures 21 and 22 and will be described below. In an exemplary embodiment, the above-mentioned definition of the virtual channel for coordinated connections is also applicable to uncoordinated connections. The definition of virtual channels and their individual applications are presented in Figure 9. Note that probe requests may not be used for uncoordinated connections, and therefore, probe virtual channels for uncoordinated connections can be canceled. Referring to FIG. 20, a table 210 is displayed, which illustrates a packet used according to an exemplary embodiment of the uncoordinated connection in the computer system 10. Other specific embodiments are possible and considered, including any other appropriate packet groups and command field codes. Form 210 contains a command code (CMD) block that describes the command code 'virtual channel (Vchan) block assigned to the parent command, defines the virtual channel assigned to each uncoordinated packet, and the Command column contains a mnemonic (please (Please read the notes on the back before filling in this page) Packing -------- Order ----- Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs This paper is printed in accordance with China National Standard (CNS) A4 specifications (210 x 297 mm) 50 91890 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 521189 A7 ~~ ----- 21 ---- 丨 -_ 5. Description of the invention (51) The symbol indicates the order, and the packet type (packet Type) block, indicating which packets 30, 212, and 214 (and data packet 36, specifically specified) are used for the corresponding command. As illustrated in Table 210, the uncoordinated packet contains NOp,

Wr(Sized)、Read(SiZed)、RdResponse、TgtDone、Broadcast、 與Sync封包,其中,於一個示範具體實施例,與第7圖描 述之對應協調封包相似。然而,需注意的是,於非協調連 接發佈無探:查封包或探查答覆封包。如上述有關協調連 接,後寫入請求可藉由設定Wr(Sized)請求封包之一個後位 元而辨識。然而,於非協調結構,一組後位元不僅作為虛 擬通道辨識器,亦指示寫入請求將不會於結構接收答覆。 亦即,與協調結構不同,TgtD〇ne答覆封包將不會於非協 調結構發佈以回應後寫入請求。 非協調封包亦包含Flush與Fence請求封包,將於下 列更詳細地敘述。 接著參照第21圖,顯示可使用於非協調聯繫之請求 封包212之一個具體實施例區塊圖示。請求封包212包含 與協調請求封包相似之命令領域(CMD[5:〇])。再者,選二 性的來源標籤領域(SrcTag[4:〇])可包含於位元㈣2,與協 調請求封包相似。位址(Addr[15:8]、Add^23 Μ、Wr (Sized), Read (SiZed), RdResponse, TgtDone, Broadcast, and Sync packets. Among them, in an exemplary embodiment, they are similar to the corresponding coordination packets described in FIG. It should be noted, however, that no probes are issued on uncoordinated connections: probe packets or probe reply packets. As mentioned above for the coordination connection, the post-write request can be identified by setting a post bit of the Wr (Sized) request packet. However, in a non-coordinated structure, a set of last bits not only serves as a virtual channel identifier, but also indicates that the write request will not receive a response at the structure. That is, unlike the coordination structure, the TgtDone response packet will not be written into the request after the non-coordination structure is released in response. Uncoordinated packets also include Flush and Fence request packets, which are described in more detail below. Referring next to Fig. 21, a block diagram of a specific embodiment of a request packet 212 that can be used for uncoordinated contact is shown. The request packet 212 contains a command field (CMD [5: 〇]) similar to the coordination request packet. Furthermore, the alternative source tag field (SrcTag [4: 〇]) can be included in bit ㈣2, which is similar to the coordination request packet. Address (Addr [15: 8], Add ^ 23 Μ,

Addr[31:24]、Addl*[39:32])包含於位元㈣ 4 i 7(且對於 农低有政位址位元選擇性地於位元時間3 )。 請求封包2U進一步包含單元ID (UnitlD[4 〇])於位元 時間1 (而非協調對應封包之來源節點ID ____ ’ 早兀EDs辨識 本紙張尺度適用中關家標準(CNS)A4規格⑵Q χ 297公餐)------------ 91890 (請先閱讀背面之注意事項再填寫本頁) 訂— 0 51 消 521189 五、發明說明(52 ) 封包之邏輯來源。I/O節點可具多個單元IDs,例如,若節 點包含多個邏輯上分離之裝置或功能。因此,ι/〇節點ζ 產生與接受具不同單元EDs之封包。於一個具體實施例, 單元印可包含五個位元。因此,若單元㈣分派至主要 橋樑,且單元的31用於報告錯誤,最多三十個單元取 可存在於連接於一個連接鏈1/〇次系統之ι/〇節點。 此外,#求封包212包含序列ID(SeqED[3:〇])領域於 位元時間〇與bSeqID領域可用於歸類與定次序一組兩 個或多個行進於相通虚擬通道裡且具相同單元肋之請求 封包。例如’若SeqID領域為零’相對於其他封包,一個 封包將無定次序。然而,若SeqID領域具有非零數值相 對於其他封包,封包將定次序於具符合數值於^仰領域 及相同UnitID之相同通道裡。 更進一步’請求封包212包含超越後寫入(PassPw)位 π於位元時間bPassPW位元指示請求封包212是否允許 超越後寫入請求由相同單元ID傳送H示範具體實 & * PassPW位疋為清除’則封包將不允許超越先前 傳送之後寫入請求封包。若設定了位元則封包 將允許超越先前後寫入封包。對於讀取請求封包,命令領 域可包含-個具指示讀取答覆是否超越後寫入請求之狀態 〜位7L之狀癌判定Passpw位元之狀態於對應讀 取請求封包之答覆封包,。 如2述,非協調請求封包包含^11叻與Fence請求。 ,_Μ W φ來源節點所使用以確保一個或多個先前發 本紙狀度適用- 91890Addr [31:24], Addl * [39:32]) are included in bit ㈣ 4 i 7 (and for agricultural low political address bit is selectively at bit time 3). The requested packet 2U further includes the unit ID (UnitlD [4 〇]) at bit time 1 (instead of the source node ID that coordinates the corresponding packet ____ 'Early EDs identification This paper standard applies the Zhongguan Standard (CNS) A4 specification ⑵Q χ (297 public meals) ------------ 91890 (Please read the notes on the back before filling this page) Order — 0 51 消 521189 V. Description of the invention (52) The logical source of the packet. I / O nodes can have multiple unit IDs, for example, if a node contains multiple logically separate devices or functions. Therefore, the ι / 〇 node ζ generates and accepts packets with different unit EDs. In a specific embodiment, the unit mark may include five bits. Therefore, if the unit ㈣ is assigned to the main bridge and 31 of the units are used to report errors, a maximum of thirty units can be present at the ι / 〇 node connected to a link chain 1 / 0th system. In addition, # 求 包包 212 contains the sequence ID (SeqED [3: 〇]) field at bit time 〇 and bSeqID field can be used to classify and order a group of two or more traveling in the same virtual channel with the same unit Cost of requesting packets. For example, 'if the SeqID field is zero' relative to other packets, one packet will be out of order. However, if the SeqID field has a non-zero value compared to other packets, the packets will be ordered in the same channel with the matching value in the ^ field and the same UnitID. Further, the 'request packet 212 contains a pass-through write (PassPw) bit π at bit time bPassPW bit indicates whether the request packet 212 allows the post-write request to be transmitted by the same unit ID. H Demonstration & Clear 'The packet will not be allowed to write beyond the request packet after the previous transmission. If the bit is set, the packet will allow the packet to be written beyond the previous one. For the read request packet, the command field may include a state indicating whether the read response exceeds the write request status ~ 7L The state of the cancer passpw bit is the reply packet corresponding to the read request packet. As described in 2, the non-coordination request packet contains ^ 11 and Fence requests. , _Μ W φ Used by the source node to ensure that one or more previous papers are suitable-91890

Μ--------^---------. (請先閱讀背面之注意事項再填寫本頁) 52 189 2 5Μ -------- ^ ---------. (Please read the notes on the back before filling out this page) 52 189 2 5

五、發明說明(53 ) 經濟部智慧財產局員工消費合作社印製 佈之後寫入已於主記愔齅扯如^ •流裡之請求,一用一 預期功能,Flush請求行進 仃八 逼於非後命令虛擬通道裡且推送 後命令虛擬通道之所有諳、兔於甘 义 月求於其之前(例如,藉由下列敘述 之PassPW位元)。因此,發佈一個Fiush請求盘接收一個 對應TgtDone答覆封包允許來 ” 汗采/原即點判定先前後請求是否 已湧入至協調結構裡之終點。V. Description of the invention (53) After printing the cloth by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs, it has been written in the main account, such as ^ • The request in the stream, one with one expected function, the Flush request went bad. All 虚拟 and rabbits in the post-command virtual channel and the post-command virtual channel are sought before Gan Yiyue (for example, by the PassPW bit described below). Therefore, issuing a Fiush request disk to receive a corresponding TgtDone response packet is allowed to "" to determine whether the previous request has flooded into the end point of the coordination structure.

Fence請求提供一個適用1/〇系統裡所有UnitIDs之後 寫入間之屏障。Fenee _求僅可於上游方向發佈且行進於 後命令虛擬通道裡。為執行其預期功能,Fence請求推送 在其之前後命令通道之所有請求。例如,若passpw位元 為清除,則Fence封包將不會超越後通道裡任何封包,無 論封包之UnitID。其他具PassPW位元清除之封包將不會 超越Fence封包無關其UnitID。 接著參照第22圖,顯示可使用於非協調聯繫之答覆 封包214之一個具體實施例區塊圖。答覆封包214包含 (CMD[5:0])命令領域、單元ID(UnitID[4:0])領域、來源標 籤(SrcTag[4.0])領域'及與請求封包212相似之passpw位 元。然而,需暸解的是其他領域與位元可依要求包含。 接著參照第23圖,顯示說明1/〇節點204A之一個具 體實施例區塊圖不。其他I/O節點204B至204C可以相似 方式配置。其他具體實施例為可能及考慮。於第23圖之具 體實施例,I/O節點204 A包含界面邏輯18M與18N、第 一組封包緩衝儲存器220、第二組封包緩衝儲存器222、與 -1 1111 --------訂 —----- (請先閱讀背面之注意事項再填寫本頁) 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 53 91890 經濟部智慧財產局員工消費合作社印製 521189 A7 B7 五、發明說明(54) 節點邏輯224。界面邏輯18M連接至線路24K與24L、封 包緩衝儲存器220、與節點邏輯224。界面邏輯18N連接 至線路24M與24N、封包緩衝儲存器222、與節點邏輯 224。節點邏輯224進一步地連接至封包緩衝儲存器220 與 222 〇 界面邏輯18M與18N配置為由線路24L與24M(個 別地)接收封包並於線路24K與24N(個別地)傳送封包。 於上述關於協調連接之界面邏輯相似,界面邏輯18M與 1 8N可分隔接收之封包至控制途徑與資料途徑。控制途徑 連接至命令封包緩衝儲存器且資料途徑連接至資料封包緩 衝儲存器。或者,界面邏輯18M與18N可不分隔接收之 封包至控制與資料途徑,或替代之,節點邏輯224可接收 對應每個位元時間之CTL信號並依照與此執行分隔。與協 調界面相似,封包緩衝儲存器220與222每個對於非協調 連接裡之每個虛擬通道包含緩衝儲存器。亦即,對於命令 封包,緩衝儲存器220與222包含後命令緩衝儲存器 (PCB)、非後命令緩衝儲存器(NPCB)、與答覆緩衝儲存器 (RB),對應於三個施行於非協調連接之虛擬通道。此外, 對於每個虛擬通道(例如,後命令資料緩衝儲存器 (PCDB)、非後命令資料緩衝儲存器(NPCDB)、與答覆資料 緩衝儲存器(RDB)),封包緩衝儲存器220與222包含資料 封包緩衝儲存器。 節點邏輯224可處理接收入緩衝儲存器220與222裡 之封包,且可起始封包以回應由I/O節點204A施行之周 <請先閱讀背面之注意事項再填寫本頁) 裝--------訂------ 本紙張尺度適用中國國家標準(CNS)A4規格(210 x 297公釐) 54 91890 經濟部智慧財產局員工消費合作杜印製 521189 A7 B7 五、發明說明(55 ) 邊功能。與第11圖顯示之控制邏輯66相似,節點邏輯224 可施行命令封包主動暫存器226A與226B(分別對應封包 緩衝儲存器220與222)與資料封包主動暫存器228A與 228B(分別對應封包緩衝儲存器220與222)。此外,因為 於非協調連接之通訊對應於單元IDs而非節點IDs,則節 點邏輯224可包含一個或多個單元ID暫存器230A至230N 以儲存分派至I/O節點204A之單元EDs。根據施行於I/O 節點裡之單元IDs數目,單元ED暫存器230A至230N之 數目可因節點不同而不同。 因為於不同虛擬通道之封包儲存於I/O節點204A裡 之不同緩衝儲存器,於不同虚擬通道之封包實際上彼此不 衝突。因此,大體上可達成無僵局操作。此外,節點邏輯 224可預先分配資源以處理答覆封包與答覆資料(如上述有 關協調連接),使得答覆封包可合併於單一虛擬通道裡。 節點邏輯224可進一步包含對應於不同I/O邏輯或由 I/O節點204A執行之周邊功能之邏輯。例如,I/O節點204A 可包含儲存周邊例如磁碟機、光碟唯讀記憶體、數位視訊 影碟光碟機等。I/O節點204A可包含通訊周邊例如IEEE 1394、以太網路、通用序列匯流排(USB)、周邊零件連接 界面(PCI)匯流排、數據機等。任何適當I/O功能可包含於 I/O 節點 204A。 參照第24圖,顯示用以接收封包之部分示範節點邏 輯224操作之流程圖。其他具體實施例為可能及考慮。雖 然第24圖所顯示之喪騍H於瞭解,以一個特定順序說 (請先閱讀背面之注意事項再填寫本頁) --------訂--------- 本紙張尺度適用中國國家標準(CNS)A4規格(210 x 297公釐) 55 91890 521189 經 濟 部 智 慧 財 產 局 員 工 消 費 合 作 社 印 製 A7 五、發明說明(56 ) 明,然任何適當順序皆可使用。此外,步驟可使用節點邏 輯224裡之結合邏輯平行地執行。對於每個界面邏輯18Νί 至18Ν,第24圖所說明之步驟可平行且獨立執行,因位元 時間可同時由每個界面邏輯接收。 於第24圖所說明之具體實施例,封包以一連串位元 時間接收至緩衝儲存器22〇與222。其他具體實施例可累 積封包之位兀時間於界面邏輯丨8Μ至〗8Ν且提供完成封包 至緩衝儲存器220與222,於此情況下將消除有關管理封 包接收於位元時間之步驟。於第24圖,步驟1〇〇至η2, 可與上面第14圖有關之對應步驟1〇〇至112描述相同或相 似。然而,節點邏輯224可施行某些額外順序規則,如於 第24圖步驟114與116部分說明。某些命令封包可設定 為”推送"已由相同來源節點傳送之後請求節點。換言之, 所推运之後請求封包於其他封包抵達其終點前,抵達終點 節點。 於一個具體實施例,例如,Flush請求封包(其定義為 具PassPW位元清除),與其他具其passpw位元清除之封 包,可定義為推送後請求封包,如上述。再者,於其Seqm 領域具非零數值之請求封包定義為於請求封包前推動,其 於相同I/O串流且具符合數值於其個別SeqlD領域。 因此,若一個接收之封包具Passpw位元清除,或一 個於SeqlD領域之非零數值(決定區塊114),節點邏輯㈣ 可尋找於後命令緩衝儲存器與命令虛擬通道裡之先前請求 I封包。例如’節點邏輯224可尋找具相同單元m =二請 本紙張尺度適用中國國家標準(CNS)A4規格⑵Gx 297公爱) 裝--------訂--------- (請先閱讀背面之注意事項再填寫本頁)、 56 91890 521189 A7Fence requested to provide a barrier between writes after applying all UnitIDs in the 1/0 system. Fenee _ Qiu can only be released in the upstream direction and travel in the post-command virtual channel. In order to perform its intended function, Fence requests to push all requests of the command channel before and after it. For example, if the passpw bit is cleared, the Fence packet will not exceed any packet in the back channel, regardless of the UnitID of the packet. Other packets with PassPW bit clearing will not exceed Fence packets regardless of their UnitID. Referring next to Fig. 22, a block diagram of a specific embodiment of a reply packet 214 that can be used for non-coordinated contact is shown. The reply packet 214 includes a (CMD [5: 0]) command field, a unit ID (UnitID [4: 0]) field, a source tag (SrcTag [4.0]) field, and a passpw bit similar to the request packet 212. However, it should be understood that other fields and bits can be included on request. Next, referring to FIG. 23, a block diagram showing a specific embodiment of the 1/0 node 204A is shown. The other I / O nodes 204B to 204C can be configured in a similar manner. Other specific embodiments are possible and considered. In the specific embodiment of FIG. 23, I / O node 204 A includes interface logic 18M and 18N, the first group of packet buffer storage 220, the second group of packet buffer storage 222, and -1 1111 ------ --Order —----- (Please read the notes on the back before filling out this page) This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) 53 91890 Employees ’Intellectual Property Bureau of the Ministry of Economic Affairs Cooperative printed 521189 A7 B7 V. Description of the invention (54) Node logic 224. The interface logic 18M is connected to the lines 24K and 24L, the packet buffer memory 220, and the node logic 224. The interface logic 18N is connected to the lines 24M and 24N, the packet buffer memory 222, and the node logic 224. The node logic 224 is further connected to the packet buffer memories 220 and 222. The interface logic 18M and 18N are configured to receive packets by the lines 24L and 24M (individually) and transmit the packets on the lines 24K and 24N (individually). The interface logic for coordinating connections is similar. Interface logic 18M and 18N can separate the received packets to the control channel and the data channel. The control path is connected to the command packet buffer memory and the data path is connected to the data packet buffer memory. Alternatively, the interface logic 18M and 18N may not separate the received packets to the control and data channels, or instead, the node logic 224 may receive the CTL signal corresponding to each bit time and perform separation according to this. Similar to the coordination interface, the packet buffer memories 220 and 222 each contain a buffer memory for each virtual channel in the uncoordinated connection. That is, for the command packet, the buffer memories 220 and 222 include a post-command buffer memory (PCB), a non-post-command buffer memory (NPCB), and a reply buffer memory (RB), corresponding to three executions in non-coordination. Connected virtual channel. In addition, for each virtual channel (eg, post-command data buffer memory (PCDB), non-post-command data buffer memory (NPCDB), and reply data buffer memory (RDB)), the packet buffer memories 220 and 222 include Data packet buffer memory. Node logic 224 can process the packets received in buffer memory 220 and 222, and can initiate packets in response to the week performed by I / O node 204A < please read the precautions on the back before filling this page) ------ Order ------ This paper size is applicable to China National Standard (CNS) A4 (210 x 297 mm) 54 91890 Consumption cooperation by employees of the Intellectual Property Bureau of the Ministry of Economic Affairs Du printed 521189 A7 B7 V. DESCRIPTION OF THE INVENTION (55) Side function. Similar to the control logic 66 shown in Fig. 11, the node logic 224 can execute the command packet active registers 226A and 226B (corresponding to the packet buffer memory 220 and 222, respectively) and the data packet active register 228A and 228B (corresponding to the packet Buffer storage 220 and 222). In addition, because communication for uncoordinated connections corresponds to unit IDs rather than node IDs, the node logic 224 may include one or more unit ID registers 230A to 230N to store the unit EDs assigned to the I / O node 204A. Depending on the number of unit IDs implemented in the I / O nodes, the number of unit ED registers 230A to 230N may vary from node to node. Because packets in different virtual channels are stored in different buffer memories in I / O node 204A, packets in different virtual channels do not actually conflict with each other. Therefore, in general, deadlock-free operation can be achieved. In addition, the node logic 224 can pre-allocate resources to process reply packets and reply data (such as the above-mentioned coordinated connection), so that reply packets can be combined into a single virtual channel. The node logic 224 may further include logic corresponding to different I / O logic or peripheral functions performed by the I / O node 204A. For example, the I / O node 204A may include storage peripherals such as a disk drive, a CD-ROM, a digital video disc drive, and the like. The I / O node 204A may include communication peripherals such as IEEE 1394, Ethernet, universal serial bus (USB), peripheral component connection interface (PCI) bus, modem, and so on. Any appropriate I / O function may be included in I / O node 204A. Referring to FIG. 24, a flowchart of part of the exemplary node logic 224 operation for receiving packets is shown. Other specific embodiments are possible and considered. Although the funeral shown in Figure 24 is understandable, it is said in a specific order (please read the precautions on the back before filling this page) -------- Order --------- This The paper size applies the Chinese National Standard (CNS) A4 specification (210 x 297 mm) 55 91890 521189 Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 5. The description of the invention (56), but any appropriate order can be used. In addition, the steps may be performed in parallel using the combination logic in the node logic 224. For each interface logic 18Nί to 18N, the steps illustrated in Figure 24 can be performed in parallel and independently, because the bit time can be received by each interface logic at the same time. In the specific embodiment illustrated in FIG. 24, the packet is received to the buffer memories 2220 and 222 in a series of bit times. Other specific embodiments may accumulate the bit time of the packet in the interface logic 8M to 8N and provide the completed packet to the buffer memories 220 and 222. In this case, the step of managing the packet reception in bit time will be eliminated. In Figure 24, steps 100 to η2 may be the same as or similar to the corresponding steps 100 to 112 described in Figure 14 above. However, the node logic 224 may implement some additional ordering rules, as explained in steps 114 and 116 of Fig. 24. Certain command packets can be set to "push" the requesting node after it has been transmitted by the same source node. In other words, the requested packet is pushed to the destination node before other packets reach its destination after being pushed. In a specific embodiment, for example, Flush Request packets (which are defined with PassPW bit clearing), and other packets with their passpw bit clearing, can be defined as request packets after pushing, as described above. Furthermore, request packet definitions with a non-zero value in their Seqm field To push before requesting a packet, it is streamed on the same I / O and has a matching value in its individual SeqlD field. Therefore, if a received packet has the Passpw bit cleared, or a non-zero value in the SeqlD field (decision area Block 114), the node logic ㈣ can look for the previous request I packet in the subsequent command buffer memory and the command virtual channel. For example, 'node logic 224 can look for the same unit m = 2. Please apply the Chinese standard (CNS) for this paper size A4 specifications ⑵ Gx 297 public love) -------- Order --------- (Please read the precautions on the back before filling this page), 56 91890 521189 A7

91890 A7 五、發明說明(58 ) 請求封包裡之位址以判 而’若下游請求封包為_^播(=2(步驟然 則’節點接受並轉送封辍則無論其他規 求封包前可施行額外步;=即點邏輯224於處理請 乂驟。例如,於決定區塊124,節點 邏軏224判定請求刼—θ ^ 匕疋否设定為推送一個尚未處理之先 則睛求封包。如I* β u 送先前請求封包⑼如右^ 了—料求封包且設定為推 位元㈣),_ =二仰領域裡非零數值或 ^ _ 、 、將圯錄欲推送之請求封包之來源標 封包之來源標籤(盘單元對應推送請求 ^ 〇早70 ID)之口ρ令緩衝儲存器,尋找一個 ^ ^月求封包。若發現—個具來源標籤和單元ID之儲存 :睛求封包,則將搁置接著推送請求封包之處理,直到先 前儲存之請求封包已處理了為止。 、、此外,、節點邏輯224配置為轉送請求封包於相同方向 (上游或下游)而非根據封包路由表袼(步驟⑷)。若封包為 流向上游,則封包將永遠不為H點,,所接受,且代之將 被轉运’直到其抵達主要橋樑為止。需注意的是,一旦處 了封G (例如,由該節點”轉送或接收),封包將由對應 緩衝儲存器位置移除且,若適用的話,相關資料封包將由 資料緩衝儲存器位置移除。 ^需進一步注意的是,若選擇之請求封包具體指定對肩 貝料封包,則不同具體實施例可處理請求封包即使資料圭 包尚未被接收。或者,處理將延緩直到完成資料封包抵達, 因此簡化轉送資料封包或允許另一之封包,其具體指定_ 1本紙張尺度適用中關家^^^)Α4 x 297 )------— 58 (請先閱讀背面之注意事項再填寫本頁) 裝--------訂---- # 經濟部智慧財產局員工消費合作社印製 91890 B7 五、發明說明(59 ) 經完全抵達之資料封包’將於相同通信連線上轉送。 ;睛求封包之處料等待完成#料封包 資料封包最終完全接收時,資料射勺1 陳况下,畲 圖之方式處理。接收時胃科封包可以上述有關第24 訂 參照第26圖,顯示一個流程圖,說明用於處理 封包之節點邏輯224 -個具體實施例之操作。其他具體 2例為可能及考慮。雖然第26圖所顯示之步驟為易於瞭 解,以-個特定順序說明,然任何適當順序皆可使用。此 外,步驟可使用節點邏輯224裡結合邏輯平行地執行。對 2每個界面邏輯18Μ^ 18N及/或每個答覆封包緩衝儲存 斋’第26圖所說明之步驟可平行且獨立執行,因由不同界 面及/或不同虛擬通道來之封包為實際上獨立。 右封包洲_向下游(步驟249),則節點邏輯224藉由檢 驗記錄於答覆封包UnitID領域及於單元①暫存器2肅 至230N之單元IDs,判定是否接收封包(步驟144,並血第 Μ圖之對應步驟144相似)。如上述,於下游答覆封包, UmtID為引起答覆發佈之最初請求封包㈣。然而,若答 ㈣包流向下游’則封包將不接受而將轉送,直到其抵達 主要橋樑為止。於上游答覆封包,為請求之目標節 點(即’發佈答覆之節點)。 與第25圖之流程圖相似,節點邏輯224可於處理答 覆封包前施行額外檢查。例如,於決定區塊i4G,節點邏 輯224判定答覆封包是否設定為推送一個尚未處理之先前 i-LiL·—右接收答覆封包且設定為推送先前請 本紙張尺度_中關*標準(CNS)A4規格⑵Q x 59 91890 A7 _ B7 五、發明說明(6〇 ) =(:如:由Passpw位元)’則當所接收之答覆封包 時’將推送請求封包之來源標籤。節點邏輯224可 之人1對應於答覆封包之來源標籤(與單元1D)之請求封包 請:器。若發現具來源標籤與單元1d之儲存 ::::止則將擱置答覆封包之處理,直到先前請求封包 轉逆覆封包之終點節點為另—節點’則節點邏輯224 =接受器裡答覆虛擬通道之間置緩衝儲存器位置之且有 可利用性之答覆封包(與势 、 封包將被轉送處(步驛Γ50)Γ於1個二=可適用)至答覆 二為-:允許答覆封包於相同方向流動之節點 游),當封包已經流動。 人 :::封包之終點節點為"該節點' 則節 以 儲 =動對應資料封包,若任何,由對應答覆資 碎得器至分配至答覆封舍咨 點mi 復封包之貝料緩衝儲存器(步驟252)。節 點邏輯224接著完成對應答覆封包之處理, ” 料緩衝儲存器(步驟254)。需注意以,—旦 理(即,被”該節點”轉送或接收), 〇 ,已地 衝儲存器位置移除,且,若可適)用㈣應f 料緩衝儲存器位置移除。 ' φ μ 需注意的是,若選擇之答覆封包具體指定 科封包,則不同具體實施例可處理答覆封包 ==。戈者,處理將延緩直封包=此接 送或允許另一封包,其具㈣定—個已經完全 f尺度適用中國國家標準(cns)A4規格⑵◦ χ 297公髮) ου 91890 -----------·&--------tr--------- (請先閱讀背面之注意事項再填寫本頁) ------- 521189 A791890 A7 V. Description of the invention (58) The address in the request packet is judged and 'if the downstream request packet is _ ^ broadcast (= 2 (steps then) the node accepts and forwards the packet dropout, regardless of other requirements, additional packets can be implemented before Step; = That point logic 224 please proceed with processing. For example, in decision block 124, the node logic 224 determines whether the request 刼 —θ ^ is set to push a packet that has not yet been processed and then requests the packet. Such as I * β u sends the previously requested packet (as shown on the right ^-the packet is requested and set to the push bit)), _ = a non-zero value in the field of ^ or ^ _, the source label of the requested packet to be recorded The source tag of the packet (the disk unit corresponds to the push request ^ 〇70 70 ID) order buffer storage, looking for a ^ ^ month to find the packet. If found-a storage with source label and unit ID: looking for the packet, then The processing of the request packet will be put on hold until the previously stored request packet has been processed. In addition, the node logic 224 is configured to forward the request packet in the same direction (upstream or downstream) rather than according to the packet routing table 袼 (step ⑷). If The packet flows upstream, then the packet will never be point H, accepted, and will instead be transshipped 'until it reaches the main bridge. It should be noted that once the packet G is processed (for example, by the node " (Transmit or receive), the packet will be removed from the corresponding buffer memory location and, if applicable, the relevant data packet will be removed from the data buffer memory location. ^ It should be further noted that if the selected request packet specifically specifies the shoulder bag material Packet, different embodiments can process the request packet even if the data packet has not been received. Or, processing will be delayed until the data packet arrives, so simplifying the transfer of the data packet or allowing another packet, which specifies _ 1 paper size Applicable to Zhongguanjia ^^^) Α4 x 297) -------- 58 (Please read the precautions on the back before filling in this page) Install -------- Order ---- # Economic Ministry Printed by the Intellectual Property Bureau's Consumer Co-operative Society 91890 B7 V. Description of the Invention (59) The data packet that has arrived completely will be forwarded on the same communication connection.; At the time of full reception, the data is processed in the same way as the image. When receiving, the gastrointestinal packet can be ordered as described above with reference to FIG. 26, and a flowchart showing the node logic for processing the packet is shown. The operation of the specific embodiment. The other two specific examples are possible and considered. Although the steps shown in FIG. 26 are easy to understand, they are described in a specific order, but any appropriate order can be used. In addition, the steps can use node logic 224 The combination of logic is executed in parallel. For each interface logic 18M ^ 18N and / or each reply packet buffer storage, the steps illustrated in Figure 26 can be performed in parallel and independently, because different interfaces and / or different virtual channels The packet is virtually independent. Right packet state_downstream (step 249), the node logic 224 determines whether to receive the packet by checking the unit IDs in the reply packet UnitID field and the unit ① register 2 to 230N (step 144, The corresponding step 144 of the M map is similar). As mentioned above, in the reply packet downstream, UmtID is the initial request packet that caused the reply release. However, if the packet flows downstream, the packet will not be accepted and will be forwarded until it reaches the main bridge. The reply packet in the upstream is the target node of the request (that is, the node that issues the reply). Similar to the flowchart in Figure 25, node logic 224 can perform additional checks before processing the reply packet. For example, in the decision block i4G, the node logic 224 determines whether the reply packet is set to push a previous i-LiL that has not yet been processed—the right receives the reply packet and is set to push the previously requested paper size_ 中 关 * 标准 (CNS) A4 Specification ⑵Q x 59 91890 A7 _ B7 V. Description of the invention (60) = (eg: Passpw bit) 'Then when the reply packet is received,' the source label of the request packet will be pushed. Node logic 224 may request a packet corresponding to the source tag (and unit 1D) of the reply packet. Please: device. If the storage with the source tag and unit 1d is found ::::, the processing of the reply packet will be suspended until the end node of the previous request packet to reverse the packet is another-node ', then the node logic 224 = reply virtual channel in the receiver A reply packet with a buffer storage location and availability (with potential, the packet will be forwarded (step Γ50) Γ in one two = applicable) to reply two is-: Allow reply packets to be the same Direction node flow), when the packet has flowed. Person ::: The end node of the packet is " The node 'then saves the corresponding data packet, if any, it will be broken up from the response reply to the reply buffer mi assigned to the reply packet. Controller (step 252). The node logic 224 then completes the processing of the response packet, "" buffering the memory (step 254). It should be noted that--(that is, transferred or received by "the node"), 〇, the location of the flushed memory is moved In addition, if applicable, remove the buffer storage position with the application material. 'Φ μ It should be noted that if the selected reply packet specifically specifies a subject packet, different specific embodiments can process the reply packet ==. If you do, the processing will delay the direct packet = this transfer or another packet is allowed, which has a fixed-a full f scale applies the Chinese National Standard (cns) A4 specification ⑵ ◦ 297 public issue) ου 91890 ----- ------ · & -------- tr --------- (Please read the notes on the back before filling this page) ------- 521189 A7

A7 A7 經 濟 部 智 慧 財 產 局 員 工 消 費 合 作 社 印 製 91890 五、發明說明(62 ) 要橋樑可判定先前封包已前進 將發佈之封包不會干擾順序。協調結構,使得隨後 主要橋樑可判定由非協調結 要求。& # m 偁來之封包何者具順序A7 A7 Printed by the Intellectual Property Office of the Ministry of Economic Affairs 91910 V. Description of the invention (62) The bridge can be judged that the previous packet has moved forward. The packet to be released will not interfere with the sequence. Coordination structure so that the main bridge can subsequently be determined to be required by non-coordination knots. &# m 偁 来 之 Packet Which Order

Se祕P 驗每個封包裡之命令編碼細ID、Secret P checks the command code in each packet.

SeqED、PassPW領域而達 益 之特別行動,其與主要橋樑可;其==需主要橋樑 何順序被發佈至協調結構。安排之封 不同之等待要求,其列於表袼270。 表格27G包含Requestj,列出順序對之第—請求, Request2攔,列出順序對之第二請鱼: 出南於主要橋樑允許第二請求繼續進行前接收之装覆。 ^料表格27G其他地方指示,則㈣之封包係於協 調此外,於-個示範具體實施例,未列於表格27〇 Γ ^需等待要求。再進—步,表袼㈣僅適用於 :主要橋樑202首先判定存在於兩個請求封包間之順序要 未。例如,順序要求可存在,若兩個請求封包具符合非零 數值序歹IDs,或若第一請求封包為一個後寫入且第二請 求具PassPW位元清除。 於表格270之第-項目,一對順序之記憶體寫入請求 由主要橋樑,藉由延緩第二記憶體寫入請求之傳送,直到 對應於第-記憶體寫入請求之一個T—封包於協調結 構由主要橋襟所接收而完成。此外,主要橋樑阻擋對應於 第二記憶體寫入請求之一個SrcDone封包,直到對應於第 丨-記憶體寫入請求之一個TgtD()ne封包被接收為止 本紙張尺度賴中國國家標準(CNS)A4規格(210 X 297公爱 -11 —I— --------^ ---------^9 (請先閱讀背面之注意事項再填寫本頁) A7 B7SeqED, PassPW and other special operations, which can be achieved with major bridges; which == requires major bridges What order is released to the coordination structure. The different waiting requirements are listed in Table 270. Form 27G contains Requestj, which lists the first order—request, Request2, and second order: the outbound repairs to the main bridge to allow the second request to continue. ^ As indicated elsewhere in Form 27G, the packet of ㈣ is coordinated. In addition, in an exemplary embodiment, it is not listed in Form 27. Γ ^ Waiting for request. Going one step further, the table only applies: the main bridge 202 first determines whether the order exists between the two requested packets. For example, a sequence requirement may exist if the two request packets have non-zero numerical sequence IDs, or if the first request packet is written after one and the second request has the PassPW bit cleared. In the first item of the table 270, a pair of sequential memory write requests are transmitted by the main bridge by delaying the transmission of the second memory write request until a T-packet corresponding to the first memory write request is received at The coordination structure is completed by the main bridge. In addition, the main bridge blocks a SrcDone packet corresponding to the second memory write request until a TgtD () ne packet corresponding to the first memory write request is received. This paper is based on the Chinese National Standard (CNS) A4 Specifications (210 X 297 Public Love-11 —I— -------- ^ --------- ^ 9 (Please read the notes on the back before filling this page) A7 B7

五、發明說明(ό3 ) 後’非協調連接上(若記情辦 ^ 1记隱體寫入為非後請求),對應於第 二記憶體寫入請灰夕τ 一 gtD〇Ile封包將延緩,直到對應於第 一 5己憶體寫入請灰> Trv+ΤΛ gtD〇ne封包由協調結 止。第28圖表格僻叩妖叹馬 • 口表格之其他項目可以與上面所給定之第一項目 敘述相似方式來解釋。 、設有主要橋樑202以施行第28圖表格所列出之等待 要求’與設有後命令虛擬通道於協調結構,以確保可符合 於協調結構裡後寫人請求之順序要求。非協調結構裡後寫 入凊求之順序要求可藉由使用Passpw位元而符合,如上 述如上述有關第9 ®之敘述,下列四個要求適用於 次系統裡PCI匯流排上之後寫入: (i)由相同來源之後寫入仍舊於目標界面維持順序; (11)由相同來源之讀取所跟隨之後寫入於讀取資料返 回刖’於目標界面完成。 (ill)非後寫入將不會超越由相同來源之後寫入;以及 (iv)後寫入需允許超越先前之非後操作。 對於指向相同協調目標節點之後寫入請求,要求⑴可 藉由放置後寫入請求封包於後命令虛擬通道,與施加表袼 270項目272之等待要求至指向不同協調目標節點之後寫 入請求而達成。要求(ii)可藉由施加表袼270項目274之等 待要求而達成。要求(iii)亦可藉由施加項目272之等待要 求而達成。最後’要求(iv)可藉由使用後命令虛擬通道而 達成。對於每個要求⑴至(iv),假設於第二封包之PassPW 位元已清除。否虬,若^設^定了 passPW位元,則第二封包 ------------------ (請先閱讀背面之注意事項再填寫本頁) 訂---------嫌 經濟部智慧財產局員工消費合作社印製 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公餐) 63 91890 五、發明說明(64) 將允許超越第-封包。表格27()内之其他項目可用於提供 於由非協調連接來之協調結構裡之其他類型要求之順序。 一旦完全瞭解了上述之揭示,許多變化與修改將為此 技藝之技術者所顯而易I。下列中請專利範圍乃意圖解釋 為包含所有此類變化與修改。 雖然本發明容許各種修改與替代形式,但特定具體實 施例已藉由圖式之範例顯示且於此處詳細說明。然而,需 瞭解的是本發明並非意圖限制至所揭示之特定形式。或2 說’本發明乃涵蓋所有落於由下列所附申料利範圍所定 義之本發明精神與範疇内之修改、均等物、與替代物。 [元件符號說明] 10 電腦系統 12A、12B、12C、12D 14A、14B、14C、14D 16A、16B、16C、16D 18A至18L 界面邏輯 22 匯流排 24A至24L 線路 30、32 38 > 42 12 處理次系統 節點 記憶體 記憶體控制器 橋樑 封包基礎雙向聯繫 214 封包 34 - 36 > 212 21〇表格 4〇A、40B虛擬通道 快速緩衝儲存區 處理器核心58 封包處理邏輯 64 資料封包緩衝儲存器V. Description of the invention (ό3) After the 'uncoordinated connection' (if the memory does ^ 1, the hidden write is a non-post request), corresponding to the second memory write, please wait for a night. GtD〇Ile packet will be delayed Until the corresponding to the first 5 mnemonic write request gray> Trv + T ΔD Done packet is terminated by coordination. Figure 28. The other forms of the mouth form can be explained in a similar way to the first item given above. 2. A main bridge 202 is provided to implement the waiting requirements listed in the table in FIG. 28 and a post-order virtual channel is set in the coordination structure to ensure that it can meet the sequence requirements of the post-writer request in the coordination structure. The sequence requirements of the post-write request in the non-coordination structure can be met by using the Passpw bit. As described above, as described above for the 9th ®, the following four requirements apply to the PCI bus in the sub-system after the write: (i) The writing from the same source still maintains the order at the target interface; (11) The writing from the same source is followed by the writing to read the data and returns to the target interface. (ill) non-post-write will not overtake subsequent writes from the same source; and (iv) post-write needs to allow past non-post operations. For write requests after pointing to the same coordination target node, the request can be achieved by placing a write request packet after ordering the virtual channel, and applying the wait request of table 270 item 272 to the write request after pointing to a different coordination target node. . Requirement (ii) can be fulfilled by imposing a waiting request under Table 270, item 274. Requirement (iii) may also be fulfilled by imposing a wait request for item 272. Finally, the request (iv) can be achieved by commanding the virtual channel after use. For each request (i) to (iv), it is assumed that the PassPW bit in the second packet is cleared. No, if ^ set ^ sets the passPW bit, the second packet ------------------ (Please read the precautions on the back before filling this page) Order- -------- The paper printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs applies the Chinese national standard (CNS) A4 specification (210 X 297 meals) 63 91890 V. Description of invention (64) Article-packet. The other items in Form 27 () can be used to provide a sequence of other types of requirements in the coordination structure from non-coordinated connections. Once the above disclosure is fully understood, many changes and modifications will be apparent to those skilled in the art. The following patents are intended to be interpreted as including all such changes and modifications. Although the invention is susceptible to various modifications and alternative forms, specific specific embodiments have been shown by way of example in the drawings and are herein described in detail. It should be understood, however, that the invention is not intended to be limited to the particular forms disclosed. Or "said" the invention encompasses all modifications, equivalents, and alternatives falling within the spirit and scope of the invention as defined by the scope of the appended claims. [Description of component symbols] 10 Computer system 12A, 12B, 12C, 12D 14A, 14B, 14C, 14D 16A, 16B, 16C, 16D 18A to 18L Interface logic 22 Bus 24A to 24L Line 30, 32 38 > 42 12 Processing Secondary system node memory memory controller bridge packet foundation bidirectional connection 214 packet 34-36 > 212 21〇 table 40A, 40B virtual channel fast buffer storage area processor core 58 packet processing logic 64 data packet buffer storage

60A > 62A ' 64A 後命令緩衝儲存器 521189 A7 B760A > 62A '64A rear command buffer memory 521189 A7 B7

五、發明說明(65 ) 60B、62B、64B 62C 62D 62E 62F 62GV. Description of the invention (65) 60B, 62B, 64B 62C 62D 62E 62F 62G

60C 60D 60E 60F 60G 66 70 > 90 74A至 74C60C 60D 60E 60F 60G 66 70 > 90 74A to 74C

64C 64D 64E 64F 64G 控制邏輯 答覆記數器 226A、226B 228A、228B 非後命令緩衝儲存器 答覆緩衝儲存器 探查緩衝儲存器 後命令資料緩衝儲存器 非後命令資料緩衝儲存器 答覆資料緩衝儲存器 68 資料緩衝儲存器槽 72 節點ID暫存器槽 命令封包主動暫存器 資料封包主動暫存器 76A至 76D、 80 資料緩衝儲存器槽位置 82、84、86、88、92、94、95、96、98 來源標籤領域 180 封包 200 I/O次系統 202 主要橋樑 204A、204B、204C I/O 節點 220、222 封包緩衝儲存器 224 節點邏輯 230A至230N ID暫存器 -----------4 (請先閱讀背面之注意事項再填寫本頁) · n ϋ ϋ ϋ I n a n ϋ #_ 經濟部智慧財產局員工消費合作社印製 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 65 9189064C 64D 64E 64F 64G Control logic reply register 226A, 226B 228A, 228B Non-post-command buffer memory Reply buffer memory Probe the buffer memory after command data buffer memory Non-post-command data buffer memory Reply data buffer memory 68 Data buffer memory slot 72 Node ID register slot Command packet active register Data packet active register 76A to 76D, 80 Data buffer memory slot positions 82, 84, 86, 88, 92, 94, 95, 96 , 98 Source tag field 180 packets 200 I / O sub-systems 202 Major bridges 204A, 204B, 204C I / O nodes 220, 222 Packet buffer storage 224 Node logic 230A to 230N ID registers -------- --- 4 (Please read the notes on the back before filling out this page) · n ϋ ϋ ϋ I nan ϋ #_ Printed on the paper by the Consumers' Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs. 210 X 297 mm) 65 91890

Claims (1)

種路由封包於電腦系統中複數個節點間之方法, 法包含: 鎚濟部智慧財產局員X消費合作社印制衣 接收第一封包於複數個節點中之第一節點,該第一 點包含複數個封包緩衝儲存器,其中每個封包緩衝儲 、‘刀配至複數個虛擬通道中之一個特定之虛擬通 道’且該第一封包於第一虛擬通道接收;以及 儲存該第一封包於第一封包緩衝儲存器,該第一封 2包緩衝儲存器專用於該第一虛擬通道所接收之封包。 如申請專利範圍第1項之方法,其中該第一封包為後請 求封包,該第一封包緩衝儲存器為後命令封包緩衝儲存 ^器’且該第一虛擬通道為後命令虛擬通道。 如申請專利範圍第2項之方法,進一步包含: 於第一節點接收第二封包; 判定接收該第二封包之第二虛擬通道;以及 根據該第二虛擬通道之判定,儲存該第二封包於第 二封包緩衝儲存器,其中若該第二虛擬通道並非後命令 地擬通道,則該第二封包緩衝儲存器與後命令封包緩衝 儲存器不同。 4·如申請專利範圍第3項之方法,進一步包含: 判定第二封包之終點;以及 若終點為不同於第一節點之第二節點、該第二節點 包含第二複數個封包緩衝儲存器、該第二複數個封包緩 衝儲存器中每一個將被分配至複數個虛擬通遒中之一 個特定虛擬通道,則 ------------裝--------訂--------- 2清先閱讀背面之注意事項再填寫本頁> 本紙張尺度適用中國國家標準(CNS)A4規格(21〇 X 297公釐) 66 91890 ^1189A method for routing packets between a plurality of nodes in a computer system, the method includes: a member of the Intellectual Property Bureau of the Ministry of Economic Affairs, X Consumer Cooperatives, prints clothes and receives a first packet among a plurality of nodes, and the first point includes a plurality of nodes A packet buffer storage, wherein each packet buffer stores, 'knifes to a specific virtual channel among a plurality of virtual channels' and the first packet is received on the first virtual channel; and the first packet is stored in the first packet Buffer memory, the first 2-packet buffer memory is dedicated to the packets received by the first virtual channel. For example, the method of claim 1 in the patent scope, wherein the first packet is a post-request packet, the first packet buffer storage is a post-command packet buffer storage device, and the first virtual channel is a post-command virtual channel. If the method of applying for the second item of the patent scope further comprises: receiving a second packet at the first node; determining a second virtual channel receiving the second packet; and storing the second packet in the second virtual channel according to the determination of the second virtual channel. The second packet buffer memory, wherein if the second virtual channel is not a post-command virtual channel, the second packet buffer memory is different from the post-command packet buffer memory. 4. The method according to item 3 of the patent application scope, further comprising: determining an end point of the second packet; and if the end point is a second node different from the first node, the second node includes a second plurality of packet buffer memories, Each of the second plurality of packet buffer storages will be allocated to a specific virtual channel of the plurality of virtual communication channels, then ------------ install -------- Order --------- 2 Please read the precautions on the back before filling in this page> This paper size applies to China National Standard (CNS) A4 (21〇X 297 mm) 66 91890 ^ 1189 、申請專利範圍 6 判定分配至該第二虛擬通道之該 緩衝餘存器其中一個之可利_;以及 個封包 點。根據判定之可利用性’傳送該第二封包至該第二節 ^專利辄圍第2項之方法’其中該後請求封人 寫入封包’具體指定包含對應寫入資料之資料封/ 如申請專利範圍第5項之方法,進一㈣封包。 於該第一節點接收該資料封包:以及 儲存該資料封包於該第一複數個封包緩衝 ^-個’該封包緩衝儲存器係分配至後命令虛擬通 7·如申請專利範圍第6項之方法’其中該第—複數個封包 緩衝儲存器包含命令封包緩衝餘存器與資料封包 儲存器’其中該後命令封包緩衝儲存器為命令封 儲存器其中之…且其中該資料封包料於該資料封^ 緩衝儲存器其中之一。 8·如申請專利範圍$ i項之方法’其中該複數個虛擬通道 包含後命令虛擬通道、非後命令虛擬通道、與答覆虛 通道。 9.如申請專利範圍帛8項之方法,其中該複數個虛擬通道 包含探查虛擬通道。 10·如申請專利範圍第3項之方法,進一步包含. 判定該第二封包是否設定為推送後請求封包,且若 如此, 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) ♦裝--------tr---------% ί請先閱硪背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印制衣 91890 經濟部智慧財產局員工消費合作社印製 521189 έΐ C8 ---------D8 _____ 六、申請專利範圍 則於後命令緩衝儲存器裡放置一個由產生該第二 封包之相同來源產生之儲存之後請求封包,·以及 於處理該第二封包前,傳送放置之儲存之後請求封 包至第二節點。 11. 一種電腦系統,包含: 第一節點,配置以傳送封包於複數個虛擬通道上; 以及 第一節點,耦接以接收由該第一節點來之封包於複 數個虛擬通道上,其中該第二節點包含複數個封包緩衝 儲存器,每個封包緩衝儲存器分配至特定的虛擬通道, 且其中該第二節點配置為儲存每個接收之封包於分配 之至接收個別封包之特定之虛擬通道上之封包緩衝儲 存器其中之一。 12·如申請專利範圍第u項之電腦系統,其中該第一節點 配置為傳送後請求封包於後命令虛擬通道上,且該第二 節點配置為儲存該第一封包於後命令封包緩衝儲存 13·如申請專利範圍第12項之電腦系統,其中該第一節點 配置為傳送第二封包至該第二節點於與後命令虛擬通 道不同之第二虛擬通道上,且該第二節點配置為儲存該 第二封包於與後命令封包緩衝儲存器不同之封包緩衝 儲存器。 14·如申請專利範圍第13項之電腦系統,進一步包含第三 節點連接以接收由該第二節點來之封包於複數個虛擬 «1--------tr------ (請先閱讀背面之注意事項再填寫本頁) 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 68 91890 經濟部智慧財產局員X消費合作、社印製 69 申請專利範圍 通道上,該第三節點包 每個該第二複數個封6弟一複數個封包緩衝儲存器, 通道,且其中該第二?緩衝儲存器分配至特定之虛糙 通道之該第二複數:二配置為根據分配至該第二虛鍵 用性,值镇 封包緩衝儲存器其中一個之可利 π丨王’得送該第二封台 1 15. 如申請專利範圍第12項該第三節點。 包包含後寫入封包夏電腦系統,纟中該後請求封 16. 如申請專利範圍第^對應之資料封包。 個封包緩衝儲存器台八八 ^ 人人 匕含分配至該後命令虛擬通道之後 ^資料緩衝儲存器,且其中該第二節點配置為根據由 節點之接收’儲存該資料封包於該後命令資料緩衝 儲存器。 衡 如申明專利範圍第13項之電腦系、统,其中該第二封包 配置為推送後請求封包,且其中該第二節點配置為尋找 由產生第二封包之相同來源所產生之儲存之後請求封 包之後命令封包緩衝儲存器,且於處理該第二節點前, 傳送儲存之後請求封包至第三節點。 18·如申請專利範圍第u項之電腦系統,其中該複數個虛 擬通道包含後命令虛擬通道與非後命令虛擬通道。 19·如申請專利範圍第18項之電腦系統,其中該複數個虛 擬通道進一步包含答覆虛擬通道。 20·如申請專利範圍第19項之電腦系統,其中該複數個虛 擬通道進一步包含探查虛擬通道。 21 · 一種用以路由封包於電腦系統中複數個節點間之方 91890 ------------^i丨丨丨丨丨丨訂·! __1丨- (請先閱讀背面之注意事項再填寫本頁)2. The scope of patent application 6 determines the profitability of one of the buffer registers allocated to the second virtual channel; and the packet points. According to the availability of the judgment, 'Method of transmitting the second packet to the second section of the second patent ^ Patent Encirclement 2', where the request is then made for the person to write the packet. The method in the scope of the patent No. 5 further packs. Receive the data packet at the first node: and store the data packet in the first plurality of packet buffers ^-'The packet buffer storage is assigned to the virtual communication after ordering 7 · Method of item 6 in the scope of patent application 'Where the first—the plurality of packet buffer storages includes a command packet buffer storage and a data packet storage', where the post command packet buffer storage is one of the command packet storages ... and wherein the data packet is contained in the data packet ^ One of buffer memory. 8. The method according to the scope of application for patent item $ i, wherein the plurality of virtual channels include a post-command virtual channel, a non-post-command virtual channel, and a reply virtual channel. 9. The method according to the scope of application for patent item No. 8, wherein the plurality of virtual channels include a probe virtual channel. 10. The method of item 3 of the scope of patent application, further comprising: determining whether the second packet is set as a push-request packet, and if so, the paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) ) ♦ -------- tr ---------% ί Please read the precautions on the back of the book before filling out this page) Intellectual Property Bureau, Ministry of Economic Affairs, Consumer Cooperatives, Printed Clothing 91890 Ministry of Economic Affairs Printed by the Intellectual Property Bureau's Consumer Cooperative 521189 ΐ ΐ C8 --------- D8 _____ VI. The scope of the patent application is placed in the buffer memory of the rear order after storing from the same source that produced the second packet Requesting a packet, and requesting a packet to a second node after transmitting the placed storage before processing the second packet. 11. A computer system comprising: a first node configured to transmit a packet on a plurality of virtual channels; and a first node coupled to receive a packet from the first node on a plurality of virtual channels, wherein the first node The two nodes include a plurality of packet buffer storages, each of which is allocated to a specific virtual channel, and wherein the second node is configured to store each received packet on a specific virtual channel allocated to receive individual packets One of the packet buffer storages. 12. The computer system of item u in the scope of patent application, wherein the first node is configured to request a packet on the post-command virtual channel after transmission, and the second node is configured to store the first packet in the post-command packet buffer storage 13 If the computer system of claim 12 is applied, the first node is configured to transmit a second packet to the second node on a second virtual channel different from the post-command virtual channel, and the second node is configured to store The second packet is in a packet buffer memory different from the post-command packet buffer memory. 14. · The computer system according to item 13 of the scope of patent application, further comprising a third node connected to receive packets from the second node in a plurality of virtual «1 -------- tr ------ (Please read the precautions on the back before filling this page) This paper size is applicable to China National Standard (CNS) A4 (210 X 297 mm) 68 91890 Intellectual Property Bureau of the Ministry of Economic Affairs X Consumer Cooperation, Printing 69 On the channel, each of the third node packet includes the second plurality of packets and a plurality of packet buffer memories, and the channel, and wherein the second? The second plural number of the buffer memory allocated to the specific virtual rough channel: two is configured to be based on the applicability assigned to the second virtual key, and the value of one of the buffer memory buffers can be sent to the second Closing station 1 15. If the third node is the 12th in the scope of patent application. The package contains the data packet which is written into the Xia computer system, and then the packet is requested. 16. The data packet corresponding to the number ^ of the patent application scope. Each packet buffer storage unit is a data buffer storage unit allocated to the post-command virtual channel, and the second node is configured to store the data packet in the post-command data according to the reception by the node. Buffer storage. Hengru declared the computer system and system of item 13 of the patent scope, wherein the second packet is configured to request a packet after pushing, and wherein the second node is configured to find a request for a packet after storage generated by the same source that generated the second packet After that, the packet buffer storage is commanded, and before processing the second node, the packet is requested to the third node after transmission and storage. 18. The computer system according to item u of the application, wherein the plurality of virtual channels include a post-command virtual channel and a non-post-command virtual channel. 19. The computer system of claim 18, wherein the plurality of virtual channels further include a reply virtual channel. 20. The computer system of claim 19, wherein the plurality of virtual channels further include a probe virtual channel. 21 · A method for routing packets between multiple nodes in a computer system 91890 ------------ ^ i 丨 丨 丨 丨 丨 丨 Orders! __1 丨-(Please read the notes on the back before filling this page) 521189 六、申請專利範圍 法,包含: 產,後請求封包於複數個節點中之第_節點;以及 傳运包含後請求封包之複數個封包,由第一經 由複數個虛擬通道,該複數個封包中之每—個將經由特 定虛擬通道傳送,其中該後請求封包傳送至第二節點於 專用於後請求封包之後命令虛擬通道上,且其中該後請 求封包與傳送於其他虛擬通道上之其他封包係獨立地 傳送。 22. 如申請專利範圍第21項之方法,其中該第二節點包含 複數個封包緩衝儲存器’該封包緩衝儲存器包含後命令 封包緩衝儲存器,每個封包緩衝儲存器將分配至複數個 虛擬通itt之特定虛擬通道,且其巾料該第二封包至 該第二節點乃根據該後命令封包緩衝儲存器之可利用 性。 23. 如申請專利範圍第22項之方法,包含: 根據接收到該後請求封包,而儲存該後請求封包於 該後命令封包緩衝儲存器於該第二節點。 24. 如申請專利範圍第21項之方法,其中該第一節點包含 複數個分配於複數個虛擬通道間之封包缓衝儲存器,本 方法包含·· 產生第二封包於該第一節點,該第二封包設定為由 目標節點產生答覆封包,· 分配其中一個封包緩衝儲存器以接收該答覆封 包’分配之封包緩衝儲存器係分配至該複數個虛擬通道 _ 家標準(CNS)A4 規袼(21G χ 297 公^ ------------#裝--------訂--------- (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 91890 521189 A8B8C8D8 六、申請專利範圍 其中之一個答覆虛擬通道;以及 傳送該第二封包至該目標節點。 (請先閱讀背面之注意事項再填寫本頁) 25. 如申請專利範圍第21項之方法,其中該第一節點包含 分配於該複數個虛擬通道間之複數個命令緩衝儲存器 與複數個資料緩衝儲存器,該方法包含: 於該第一節點接收經由與該後命令虛擬通道不同 之第一虛擬通道之封包; 判定接收之封包是否具體指定對應資料封包;且若 如此, 則分配分配至該第一虛擬通道之資料緩衝儲存器 其中一個以儲存對應之資料封包;以及 根據由第一節點之接收,儲存對應資料封包於分配 之資料緩衝儲存器。 26. 如申請專利範圍第25項之方法,包含: 判定接收之封包之終點節點,該終點節點包含分配 於複數個虛擬通道間之複數個命令緩衝儲存器與複數 個資料緩衝儲存器; 經濟部智慧財產局員工消費合作社印製 判定分配至該第一虛擬通道之命令緩衝儲存器其 中一個與資料緩衝儲存器其中一個之可利用性;以及 根據判定之可利用性,於該第一虛擬通道上傳送接 收之封包與對應資料封包至終點節點。 27. —種電腦系統,包含: 第一節點,配置為經由複數個虛擬通道傳送複數個 封包,該第一節點配置為經由複數個虛擬通道中之後命 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 71 91890 A8 B8 C8 D8521189 VI. The scope of patent application method includes: producing, and requesting the _th node in a plurality of nodes; and transporting a plurality of packets including a post request packet, the first through a plurality of virtual channels, the plurality of packets Each of them will be transmitted via a specific virtual channel, where the post-request packet is transmitted to the second node for the post-request packet dedicated to the post-command virtual channel, and where the post-request packet and other packets transmitted on other virtual channels They are transmitted independently. 22. For the method of claim 21, wherein the second node includes a plurality of packet buffer storages, the packet buffer storage includes a post-command packet buffer storage, and each packet buffer storage is allocated to a plurality of virtual buffer storages. Passing the specific virtual channel of itt, and its toweling the second packet to the second node is based on the availability of the packet buffer memory according to the post-command. 23. The method of claim 22, comprising: storing the post-request packet in the post-command packet buffer storage at the second node according to the post-request packet being received. 24. If the method of claim 21 is applied, the first node includes a plurality of packet buffer storages allocated between a plurality of virtual channels, and the method includes: generating a second packet at the first node, the The second packet is set to generate a reply packet by the target node. · Allocate one of the packet buffer storages to receive the reply packet. The allocated packet buffer storage is allocated to the plurality of virtual channels. 21G χ 297 male ^ ------------ # 装 -------- Order --------- (Please read the precautions on the back before filling this page) Printed by the Employees' Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 91890 521189 A8B8C8D8 6. One of the patent application scopes responds to the virtual channel; and sends the second packet to the target node. (Please read the precautions on the back before filling this page) 25 The method of claim 21, wherein the first node includes a plurality of command buffer storages and a plurality of data buffer storages allocated between the plurality of virtual channels, and the method includes: in the first section Receiving a packet via a first virtual channel different from the post-command virtual channel; determining whether the received packet specifically specifies a corresponding data packet; and if so, allocating one of the data buffer storages allocated to the first virtual channel to store The corresponding data packet; and the corresponding data packet is stored in the allocated data buffer storage according to the reception by the first node. 26. If the method of the scope of patent application No. 25 includes: determining the end point of the received packet, the end point The node includes a plurality of command buffer storages and a plurality of data buffer storages allocated between the plurality of virtual channels; one of the command buffer storages allocated to the first virtual channel by the consumer consumption cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs and the printed judgment The availability of one of the data buffer storages; and according to the determined availability, the received packet and the corresponding data packet are transmitted to the destination node on the first virtual channel. 27. A computer system including: a first node , Configured to transmit complexes via multiple virtual channels Packets of the first node is configured to apply commands to the present paper China National Standard Scale (CNS) A4 size (210 X 297 mm) via a plurality of virtual channels after 71 91890 A8 B8 C8 D8 二、申請專利範圍 令虛擬通道產生與傳送後請求封包,該第一節點配置 經濟部智慧財產局員工消費合作社印制衣 521189 與經由其他複數個虛擬通道傳送之其他複數個封包獨 立地傳送後請求封包;以及 第二節點連接以接收後請求封包。 28_如申請專利範圍第27項之電腦系統,其中該第二節點 包含複數個封包緩衝儲存器分配於複數個虛擬通道 間,且其中該第一節點配置為根據於分配至該後命令虛 擬通道之該第二節點裡該複數個封包緩衝儲存器中2 可取得封包緩衝儲存器,傳送該後請求封包至該第二節 點。 29.如申請專㈣圍第28項之電腦系統,其中該第二節點 配置為根據其接收,儲存該後請求封包於可取得封包緩 衝儲存器。 3〇·如申請專利範圍第27項之電腦系统,其中該第一節點 包含複數個分配於複數個虛擬通道間之封包緩衝儲存 器’且其中該第一卽點配置為產生第二封包,該第二封 包設定為由目標節點產生答覆封包,且其中該第一節點 配置為分配其中一個封包緩衝儲存器以於傳送第二封 包至目標節點前接收答覆封包,該分配之封包將分配至 複數個虛擬通道中之其中一個答覆虛擬通道。 31·如申請專利範圍第27項之電腦系统,其中該第一節點 包含複數個分配於複數個虛擬通道間之命^缓衝儲存 器與複數個資料級衝儲存’且其中第一節點設定為: 判定於與後命令虛擬通道不同之第_虛擬通道上 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 91890 ------------裝--------訂------- {請先閱讀背面之注意事項再填寫本頁} 521189 A8 B8 C8 D8 六、申請專利範圍 接收之封包是否具體指定對應之資料封包; 分配分配至該第一虛擬通道之資料緩衝儲存器其 中之一以儲存對應之資料封包;以及 根據接收,儲存該對應資料封包於該分配之資料緩 衝儲存器。 32.如申請專利範圍第21項之電腦系統,其中該第一節點 配置為: 判定接收之封包之終點節點,該終點節點包含分配 於該複數個虛擬通道間之複數個命令緩衝儲存器與複 數個資料緩衝儲存器; 判定於終點節點之其中一個命令媛衝儲存器與其 中一個資料緩衝儲存器之可利用性,該命令緩衝儲存器 與該資料緩衝儲存器係分配至該第一虛擬通道;以及 根據判定之可利用性,於該第一虚擬通道傳送該接 收之封包與該對應之資料封包至該終點節點。 -----------f--------訂!!_·· (請先閱讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) 73 918902. The scope of the patent application makes the virtual channel generate and request a packet after transmission. The first node is configured to print clothing 521189 of the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs and the other packets are transmitted independently through other virtual channels. Packet; and a second node connects to request a packet after receiving. 28_ The computer system of claim 27, wherein the second node includes a plurality of packet buffer storages allocated between the plurality of virtual channels, and wherein the first node is configured to be assigned to the post-command virtual channel according to the allocation Among the plurality of packet buffer memories in the second node, 2 can obtain a packet buffer memory, and transmit the subsequent request packet to the second node. 29. If applying for the computer system of item 28, wherein the second node is configured to store the request packet after receiving the packet in an available buffer buffer. 30. If the computer system according to item 27 of the patent application scope, wherein the first node includes a plurality of packet buffer storages allocated between a plurality of virtual channels, and wherein the first node is configured to generate a second packet, the The second packet is set to generate a reply packet by the target node, and the first node is configured to allocate one of the packet buffer storages to receive the reply packet before transmitting the second packet to the target node, and the allocated packet will be allocated to a plurality of packets. One of the virtual channels responds to the virtual channel. 31. The computer system according to item 27 of the scope of patent application, wherein the first node includes a plurality of buffer storages and a plurality of data-level buffer storages allocated between a plurality of virtual channels, and the first node is set as : It is judged that the paper size on the virtual channel which is different from the post-command virtual channel applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) 91890 ------------ install- ------ Order ------- {Please read the notes on the back before filling out this page} 521189 A8 B8 C8 D8 VI. Whether the packets received in the scope of patent application specifically specify the corresponding data packets; To one of the data buffer storages of the first virtual channel to store a corresponding data packet; and according to the reception, storing the corresponding data packet in the allocated data buffer storage. 32. The computer system of claim 21, wherein the first node is configured to: determine an end node of the received packet, the end node including a plurality of command buffer memories and a plurality of numbers allocated between the plurality of virtual channels; Data buffer storage; determining the availability of one of the command buffer storage and one of the data buffer storage at the destination node, the command buffer storage and the data buffer storage are allocated to the first virtual channel; And according to the determined availability, the received packet and the corresponding data packet are transmitted to the destination node on the first virtual channel. ----------- f -------- Order! !! _ ·· (Please read the notes on the back before filling out this page) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs This paper size applies to China National Standard (CNS) A4 (210 X 297 mm) 73 91890
TW90120192A 2000-08-17 2001-08-17 System and method for implementing a separate virtual channel for posted requests in a multiprocessor computer system TW521189B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US09/640,602 US6950438B1 (en) 1999-09-17 2000-08-17 System and method for implementing a separate virtual channel for posted requests in a multiprocessor computer system

Publications (1)

Publication Number Publication Date
TW521189B true TW521189B (en) 2003-02-21

Family

ID=24568914

Family Applications (1)

Application Number Title Priority Date Filing Date
TW90120192A TW521189B (en) 2000-08-17 2001-08-17 System and method for implementing a separate virtual channel for posted requests in a multiprocessor computer system

Country Status (6)

Country Link
EP (1) EP1314094B1 (en)
JP (1) JP4906226B2 (en)
AU (1) AU2001280857A1 (en)
DE (1) DE60109940T2 (en)
TW (1) TW521189B (en)
WO (1) WO2002015470A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI556094B (en) * 2014-03-20 2016-11-01 英特爾公司 A method, apparatus, and system for controlling power consumption of unused hardware of a link interface

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7003615B2 (en) * 2002-04-22 2006-02-21 Broadcom Corporation Tracking a non-posted writes in a system using a storage location to store a write response indicator when the non-posted write has reached a target device
US7194566B2 (en) * 2002-05-03 2007-03-20 Sonics, Inc. Communication system and method with configurable posting points
US20050237329A1 (en) * 2004-04-27 2005-10-27 Nvidia Corporation GPU rendering to system memory
US7165131B2 (en) 2004-04-27 2007-01-16 Intel Corporation Separating transactions into different virtual channels
US7702835B2 (en) * 2005-02-03 2010-04-20 Oracle America, Inc. Tagged interrupt forwarding
US7945719B2 (en) * 2006-09-20 2011-05-17 Intel Corporation Controller link for manageability engine
US7861024B2 (en) * 2008-09-30 2010-12-28 Intel Corporation Providing a set aside mechanism for posted interrupt transactions
US8392667B2 (en) * 2008-12-12 2013-03-05 Nvidia Corporation Deadlock avoidance by marking CPU traffic as special
US9910807B2 (en) 2011-11-29 2018-03-06 Intel Corporation Ring protocol for low latency interconnect switch
WO2013081579A1 (en) 2011-11-29 2013-06-06 Intel Corporation Ring protocol for low latency interconnect switch

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1993023810A1 (en) * 1992-05-12 1993-11-25 Seiko Epson Corporation Scalable coprocessor
JPH08185380A (en) * 1994-12-28 1996-07-16 Hitachi Ltd Parallel computer
US6055618A (en) * 1995-10-31 2000-04-25 Cray Research, Inc. Virtual maintenance network in multiprocessing system having a non-flow controlled virtual maintenance channel
US6094686A (en) * 1997-10-24 2000-07-25 Compaq Computer Corporation Multi-processor system for transferring data without incurring deadlock using hierarchical virtual channels
US6490630B1 (en) * 1998-05-08 2002-12-03 Fujitsu Limited System and method for avoiding deadlock in multi-node network

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI556094B (en) * 2014-03-20 2016-11-01 英特爾公司 A method, apparatus, and system for controlling power consumption of unused hardware of a link interface
US9552045B2 (en) 2014-03-20 2017-01-24 Intel Corporation Method, apparatus, and system for controlling power consumption of unused hardware of a link interface

Also Published As

Publication number Publication date
AU2001280857A1 (en) 2002-02-25
DE60109940T2 (en) 2006-02-09
EP1314094A2 (en) 2003-05-28
EP1314094B1 (en) 2005-04-06
DE60109940D1 (en) 2005-05-12
WO2002015470A3 (en) 2003-02-27
JP2004506986A (en) 2004-03-04
JP4906226B2 (en) 2012-03-28
WO2002015470A2 (en) 2002-02-21

Similar Documents

Publication Publication Date Title
US6950438B1 (en) System and method for implementing a separate virtual channel for posted requests in a multiprocessor computer system
US7069361B2 (en) System and method of maintaining coherency in a distributed communication system
CN1985247B (en) Memory read requests passing memory writes
TW472195B (en) Method and apparatus for achieving correct order among bus memory transactions in a physically distributed SMP system
CN101878475B (en) Delegating network processor operations to star topology serial bus interfaces
TW533353B (en) Non-uniform memory access (NUMA) data processing system with multiple caches concurrently holding data in a recent state from which data can be sourced by shared intervention
TWI362613B (en) System and method for validating a memory file that links speculative results of load operations to register values
TW446877B (en) Non-uniform memory access (NUMA) data processing system that speculatively issues requests on a node interconnect
TW432291B (en) Non-uniform memory access (NUMA) data processing system that holds and reissues requests at a target processing node in response to a retry
US6721813B2 (en) Computer system implementing a system and method for tracking the progress of posted write transactions
US7437518B2 (en) Hiding conflict, coherence completion and transaction ID elements of a coherence protocol
US6557048B1 (en) Computer system implementing a system and method for ordering input/output (IO) memory operations within a coherent portion thereof
US6938094B1 (en) Virtual channels and corresponding buffer allocations for deadlock-free computer system operation
US11314675B2 (en) Interface circuitry for exchanging information with master, home, and slave nodes using different data transfer protocols
TW521189B (en) System and method for implementing a separate virtual channel for posted requests in a multiprocessor computer system
CN106815151A (en) High-performance interconnects coherence protocol
US6910062B2 (en) Method and apparatus for transmitting packets within a symmetric multiprocessor system
TW200534110A (en) A method for supporting improved burst transfers on a coherent bus
US20030095557A1 (en) Response virtual channel for handling all responses
CN101802796A (en) Prevent the competition that writes back in the polycaryon processor
TW577024B (en) Method and apparatus for providing global coherence in a large-way, high performance SMP system
TW486630B (en) Method and apparatus for supporting multi-clock propagation in a computer system having a point to point half duplex interconnect
TW498210B (en) Non-uniform memory access (NUMA) data processing system that decreases latency by expediting rerun requests
CN112074821B (en) Method, apparatus and medium for performing read transactions in a data processing network
US6714994B1 (en) Host bridge translating non-coherent packets from non-coherent link to coherent packets on conherent link and vice versa

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent
MK4A Expiration of patent term of an invention patent